Google has stopped quantum security at Chrome due to middleware or middleware bugs as reported by the company.
Google said on Tuesday it had temporarily disabled the quantum computer-resistant security feature on Chrome, as it received bug reports that faulty middleware caused unexpected site connection failures for the few users who had the feature enabled.
The function is known as Combined Elliptic-Curve and Post-Quantum 2, or simply CECPQ2, and was developed to improve cryptography on TLS connections. So when quantum computers are released, potential malicious users will not be able to decrypt HTTPS traffic and have access to secure communications.
The CECPQ2 was first developed in 2016, together with Cloudflare engineers, and was available at Chrome 91 released in May this year. It was initially enabled for all domains starting with the letter "A", so that Google engineers could test the behavior of the new feature while still working on it.
The function seems to have worked by adding a key isogeneous key to its TLS trading element Chrome, to further secure an encrypted HTTPS connection.
The error occurred because CECPQ2 generates larger TLS packets.
Google reported that some middleware devices could not handle these packages, resulting in unexpected connection failures.
Users who still want to use it CECPQ2 they can activate it again manually for all domains, by teasing the following flag. Just change it to "Enabled".
According to a document [PDF] published last month, the US National Security Agency (NSA) says it does not know of any quantum computers capable of hacking current encryption algorithms.