BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
β€’
Β© 2026
β€’
blacktemple.net
  1. Feed
  2. /Chrome Announces Quantum-Safe Certificate Program Using Merkle Tree Certificates

Chrome Announces Quantum-Safe Certificate Program Using Merkle Tree Certificates

February 28, 2026Application Security3 min readmedium

Originally reported by Google Online Security

#quantum-cryptography#tls-certificates#pki#chrome-browser#post-quantum#merkle-trees
Share

TL;DR

Chrome is launching a quantum-safe certificate program that replaces traditional X.509 certificates with Merkle Tree Certificates (MTCs) to address performance issues from post-quantum cryptography. The rollout begins with a Cloudflare feasibility study in 2026, followed by CT log operator participation in Q1 2027 and a dedicated Chrome Quantum-resistant Root Store in Q3 2027.

Why medium?

This represents a significant architectural shift in web PKI to address quantum threats, with concrete implementation timeline starting 2027. While not an immediate vulnerability, it affects fundamental web security infrastructure.

Chrome's Quantum-Safe Certificate Initiative

Google's Chrome team announced a comprehensive program to transition HTTPS certificates to quantum-resistant technology, addressing the looming threat of cryptographically relevant quantum computers. Rather than simply adding post-quantum algorithms to existing X.509 certificates, which would create significant bandwidth and performance overhead, Chrome is pioneering an entirely new certificate architecture.

Merkle Tree Certificates: A New PKI Paradigm

The initiative centers on Merkle Tree Certificates (MTCs), currently under development in the IETF's "PKI, Logs, And Tree Signatures" (PLANTS) working group. MTCs fundamentally reimagine certificate validation by replacing traditional certificate chains with compact Merkle tree proofs.

In the MTC model, a Certification Authority signs a single "Tree Head" representing potentially millions of certificates. The certificate presented to browsers becomes merely a lightweight proof of inclusion in that tree, dramatically reducing the bandwidth requirements that would otherwise plague post-quantum TLS connections.

Three-Phase Implementation Timeline

Phase 1: Feasibility Study (Underway)

Chrome has partnered with Cloudflare to conduct real-world performance testing of MTC-based TLS connections. Critically, every MTC connection during this phase maintains a traditional X.509 certificate as a failsafe, allowing Chrome to measure performance gains while ensuring zero impact on user security or connection reliability.

Phase 2: CT Log Operator Integration (Q1 2027)

Chrome will invite Certificate Transparency log operators, specifically those with "usable" logs in Chrome before February 1, 2026, to participate in bootstrapping public MTCs. These operators already demonstrate the operational excellence and high-availability infrastructure necessary for global TLS security services, making them ideal candidates for MTC deployment given the architectural similarities between MTC technology and Certificate Transparency.

Phase 3: Quantum-Resistant Root Store (Q3 2027)

The final phase introduces the Chrome Quantum-resistant Root Store (CQRS), a purpose-built trust store exclusively supporting MTCs. This dedicated root program will operate alongside Chrome's existing root store, enabling a risk-managed transition while maintaining backward compatibility.

Policy and Operational Changes

Chrome's quantum-safe initiative extends beyond technical implementation to encompass fundamental PKI policy reforms:

  • ACME-only workflows to reduce complexity and ensure cryptographic agility
  • Modern revocation frameworks replacing legacy Certificate Revocation Lists with streamlined key compromise event handling
  • Reproducible Domain Control Validation enabling public verification of domain ownership proofs
  • Performance-based CA inclusion requiring prospective CAs to demonstrate reliability as Mirroring Cosigners and DCV Monitors before full acceptance
  • Continuous external monitoring replacing annual third-party audits with real-time transparency mechanisms

Transition Strategy

Chrome emphasized its commitment to supporting existing CA partners during the transition, facilitating root rotations to maintain current PKI hierarchies. The company also indicated plans to support traditional X.509 certificates with quantum-resistant algorithms for private PKI deployments later this year, though these will not be included in the public Chrome Root Store.

Industry Implications

This announcement positions Chrome at the forefront of post-quantum web security, potentially influencing PKI evolution across the entire internet. The success of MTCs could establish a new standard for quantum-safe certificate infrastructure, while the performance data from the Cloudflare collaboration will provide crucial insights for the broader security community.

The timeline suggests Chrome expects quantum computers capable of breaking current cryptographic systems to pose a realistic threat within the next 3-5 years, making this transition both urgent and strategically necessary.

Sources

  • Cultivating a robust and efficient quantum-safe HTTPS

Originally reported by Google Online Security

Tags

#quantum-cryptography#tls-certificates#pki#chrome-browser#post-quantum#merkle-trees

Tracked Companies

πŸ‡ΊπŸ‡ΈGoogle

Related Intelligence

  • OpenClaw's Security Posture Under Fire: 160+ Advisories Signal Systemic Issues

    mediumMar 4, 2026
  • Google Expands AI-Powered Scam Detection to Samsung Devices, Adds Gemini Model for Complex Threats

    informationalFeb 26, 2026
  • Threat Actors Deploy Sophisticated Scanning Tool for React2Shell Vulnerability Exploitation

    mediumFeb 21, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← ClawJacked Vulnerability in OpenClaw Enables Browser-Based AI Agent Hijacking

Next Article

Weekly Vulnerability Roundup: OpenClaw AI Agent Hijacking, Vim Command Injection, and Vitess Path Traversal β†’