Why Post-Quantum Encryption for VPNs Is a Must for the Future


Virtual private networks (VPNs) are a cornerstone of online privacy. They encrypt your data, hide your IP address, and provide secure connections. Most VPNs rely on AES or ChaCha20 encryption today. But with the rise of quantum computing, these encryption standards may not be safe for long. As a result, VPN providers are starting to roll out post-quantum encryption (PQE) to prepare for this future threat. Let’s dive into what PQE is, why it’s important, and which VPNs are already using it.

What Is Post-Quantum Encryption (PQC)?

Post-quantum encryption (PQC) refers to cryptographic algorithms designed to resist the power of quantum computers. Traditional VPNs use AES-256 and RSA algorithms. These are safe for now but could be broken by quantum computers. Quantum computers use qubits, which allow them to process data faster than classical computers. This makes them a threat to current encryption systems.

To combat this, experts developed quantum-resistant algorithms, such as CRYSTALS-Kyber and ML-KEM, which are now being adopted by VPN providers. These algorithms aim to secure data against quantum attacks and offer a safer future for online privacy.

Why Does Post-Quantum Encryption Matter for VPNs?

VPNs rely on a process called the “handshake” to establish a secure connection between your device and the VPN server. The handshake uses algorithms like RSA and Diffie-Hellman, which quantum computers can break. Once quantum computing becomes powerful enough, it will render these handshakes insecure, allowing attackers to decrypt your data.

Post-quantum encryption addresses this by using quantum-resistant algorithms during the handshake, ensuring the connection remains secure even against quantum threats. This quantum-proof technology protects your VPN’s ability to mask your IP and encrypt your data.

Which VPNs Use Post-Quantum Encryption?

Some VPN providers have already integrated PQE to future-proof their services. These VPNs are ahead of the curve in protecting their users from quantum threats:

  • ExpressVPN: ExpressVPN was one of the first to implement PQE. They use the Lightway protocol and post-quantum WireGuard, which rely on the ML-KEM algorithm for quantum resistance. It’s available on Android, iOS, Linux, Windows, and Mac.
  • NordVPN: NordVPN offers post-quantum encryption through NordLynx. This protocol uses the ML-KEM algorithm, providing quantum-resistant encryption on platforms like Linux, Windows, macOS, Android, and iOS.
  • Mullvad VPN: Mullvad enables PQE by default on all WireGuard connections. It uses the ML-KEM algorithm to provide quantum resistance and is available on Windows, Mac, Linux, Android, and iOS.

These VPNs are already offering quantum-proof technology, protecting users against future risks.

Are There Any Drawbacks to Post-Quantum Encryption?

While PQE is crucial for long-term security, it does come with a few trade-offs. Enabling PQE can slightly slow down your connection speed, especially on lower-end devices. The encryption algorithms require larger key sizes and more cryptographic operations, which can introduce latency. This could affect bandwidth-intensive activities like streaming or video calls.

Another limitation is compatibility. Some VPN features, such as dedicated IPs, Meshnet, or obfuscated servers, don’t support PQE yet. As a result, you may lose the benefits of PQE if you use these features.

Why You’ll Be Glad Your VPN Has PQE

Right now, PQE is an optional feature, similar to other advanced privacy options like ProtonVPN’s Secure Core or multi-hop servers offered by NordVPN and Surfshark. But once quantum computers become a real threat, PQE will no longer be optional. It will likely become a default feature in all VPN protocols, ensuring your data remains secure.


Joel Wamono