What is PQ3, Apple's new iMessage security protocol?
What is the PQ3 protocol?
Currently, communication security is measured by three security levels.
- Level 0: In this level, messages remain unencrypted.
- Level 1: Here messages are end-to-end encrypted, but there is no additional authentication or quantum security.
- Level 2: This includes authentication and quantum security, but they are limited to initial key establishment. This means that quantum security can only be provided if the conversation key material can never be compromised.

The new iMessage security protocol PQ3 is the first to be deemed to achieve what Apple calls “Level 3 Security” Messaging protocol. The protocol uses quantum encryption technology to secure key generation and message exchange. Level 3 PQC automatically restores the confidentiality of conversations even if keys are compromised. Therefore, PQ3 is claimed to surpass other widely used protocols in messaging applications.
Why is Apple moving to PQ3 protocol for iMessage?
Since its launch in 2011, Apple’s iMessage has supported end-to-end encryption and is enabled by default. Over the years, Apple has continuously improved its cryptography technology to ensure the security of user data. Although existing encryption algorithms are considered secure in the current environment, increased quantum computing capabilities may pose challenges to these algorithms as the technology develops. Therefore, in order to deal with potential threats in the future, the field of cryptography continues to conduct research and innovation to ensure the reliability and security of encryption technology.
Such a quantum computer does not exist today. However, a resourceful attacker can do their homework before arriving in the future. Such attackers can manage to collect large amounts of encrypted data and store it for future reference. While they can't decrypt any of the collected data today, they could use quantum computers to do so in the future. This attack scheme is called "Harvest now, decrypt later".
iMessage’s new security protocol, PQ3, is designed to protect users from “harvest now, decrypt later” attacks. Apple says that because PQ3 implements "Level 3" security, it ensures "initial key establishment and ongoing message exchange."
How does the PQ3 protocol work?
The new PQ3 protocol brings new post-quantum encryption keys to the public key set. Each device generates these public keys locally and then transmits them to Apple servers as part of the iMessage registration process. To do this, Apple uses the Modular Lattice-based Key Encapsulation Mechanism standard, or ML-KEM, which enables the sender device to obtain the recipient's public key and generate a post-quantum encryption key for the first message. This works even if the receiver is offline.
Apple then includes a periodic post-quantum rekeying mechanism in the conversation. This mechanism can self-heal from key compromise and protect future messages.
"In PQ3, the new key sent with the conversation is used to create a new message encryption key that cannot be calculated from past message encryption keys, thereby returning the conversation to a secure state , even if the previous key is extracted or compromised by an adversary."
Impressively, PQ3 is the first large-scale cryptographic messaging protocol to deploy this post-quantum rekeying property .
Advantages of the PQ3 protocol
For PQ3, Apple has not replaced or modified the existing algorithm. Instead, it rebuilt the iMessage encryption protocol from the ground up to provide the following benefits:
- Protect the entire communication from current and future adversaries.
- It limits the number of past and future messages that can be decrypted using a single compromised key. This mitigates the impact of critical intrusions.
- Amortize the message size to prevent any excessive overhead.
- PQ3 is based on a hybrid design that combines new post-quantum algorithms with current elliptic curve algorithms. This ensures that PQ3 will never be less secure than existing protocols.
- Formal verification methods to high-level security assurance.
PQ3 Protocol Availability in iMessage
Apple will gradually begin rolling out PQ3 for support of iMessage conversations with iOS 17.4, iPadOS 17.4, macOS 14.4, and watchOS 10.4. The giant said the latest beta versions of these software updates already feature this security protocol. Apple also confirmed that visionOS will not have a PQ3 protocol when it initially launches.
The above is the detailed content of What is PQ3, Apple's new iMessage security protocol?. For more information, please follow other related articles on the PHP Chinese website!

The Apple Watch: Still Not Convinced After a Decade Despite over 200 million units sold since 2015, the Apple Watch remains absent from my wrist. While its health and fitness features are impressive, they don't appeal to someone like me who doesn't

New features of Apple Mail app: Categories, Summary, and Contact Photos The Apple Mail app recently updated its iPhone, iPad and Mac versions, adding features like Gmail-like email classification, notifications and email summary, and contact photos in your inbox. But not everyone likes these new changes. Fortunately, you can disable these new features and restore to a simpler way to use them. Here's how to do it: Disable Apple Mail Classification The email classification feature is designed to sort your inboxes to make it easier to process incoming messages. This feature is suitable for any device running iOS or iPadOS 18.2 and Mac computers with macOS 15.4 installed. Categories include: Main: Mail thinks the most

Ultra-thin phones: Amazing design or risky? Samsung and Apple are about to release ultra-thin flagship phones Samsung Galaxy S25 Edge and Apple iPhone 17 Air are about to be released, and its ultra-thin design has sparked heated discussions. While many fans are concerned about their design compromises, ultra-thin phones still have some attractive advantages. Ultra-thin design: how much does it cost? First of all, these devices are expensive. Ultra-thin design requires custom parts and improved manufacturing processes, greatly increasing costs and ultimately passing them on to consumers. While prices may change at any time, reliable news shows that the iPhone 17 Air may be priced the same as the $899 iPhone Plus, or even likely to completely replace the latter; while the S25 Edge

Take advantage of the Apple Watch running features: From default training to custom planning I've been using default running training I finally found the pacemaker and custom training Easy way to create custom Apple Watch training Make the most of your Apple Watch I'm currently training for a half marathon, which means I'm running three times a week, one to two hours a day, making the most of my Apple Watch. I've been running 142 miles this year, but I've just discovered a game-changing Apple Watch running feature. Related ###### I ran a half marathon with AirPods 4, how effective I'm curious about the new AirPod

Life Hacks We Wish Were Real: Tech Features We Crave in Real Life Modern technology offers incredible conveniences, so much so that we often take them for granted. Pausing live TV, undoing computer errors, or voice-commanding music – these are ever

Apple's Shortcuts app offers a "Wait" action for short pauses, but it's unreliable for longer durations. This limitation stems from iOS's background app restrictions. A clever workaround uses custom Focus modes to achieve extended waits,

The iPhone 16 ProMax will have a screen size of 6.9 inches, aiming to provide a more immersive visual experience while maintaining a thin and light design to improve user operation comfort.

The iPhone 17 has not been released yet and is expected to debut in the fall of 2025. 1. Performance improvement: It may be equipped with a more powerful A17 chip. 2. Camera improvement: Possibly improve pixels and sensors, and advance ProRAW and ProRes formats. 3. Design changes: It may adopt a narrower or borderless design, using new materials. 4. New features are introduced: There may be breakthroughs in health monitoring and AR.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft