Post-Quantum TLS in 2026: What's Already Live in Your Browser

Post-quantum cryptography stopped being a slideware topic somewhere around late 2024. Today, every major browser ships a post-quantum-safe key exchange by default, NIST has standardised the algorithms, and the first quantum-safe TLS certificates are being issued in test environments. Here's what's actually deployed, what's coming next, and what you should do about it.

Quick check: Want to know if your server already negotiates a post-quantum hybrid? Our free PQC Readiness Checker tells you in seconds.

The Threat: Harvest Now, Decrypt Later

A sufficiently large quantum computer running Shor's algorithm breaks RSA, DH, and ECDH in polynomial time. We don't have one yet. The optimistic estimates put a cryptographically-relevant quantum computer (CRQC) at 10–20 years away; the pessimistic ones at fewer than ten. The exact number doesn't matter, because of one attacker behaviour:

Harvest now, decrypt later. A nation-state adversary doesn't need a quantum computer today. It needs only to record encrypted traffic today and decrypt it when a CRQC arrives. Anything you send over classical TLS in 2026 with a 20-year sensitivity window — medical records, identity documents, embassy cables, source code, credentials — is on the table.

This is why the rollout is happening now, years before quantum computers can break anything. Key exchange (the part that establishes the symmetric session key) is the urgent fix; signatures (certificates) can wait, because forging a signature retroactively is useless.

What NIST Standardised

On 13 August 2024, NIST published the first three post-quantum standards. These replace roughly the entire current asymmetric stack:

Standard Algorithm Replaces Used For
FIPS 203 ML-KEM (CRYSTALS-Kyber) RSA, ECDH, X25519 Key encapsulation / TLS key exchange
FIPS 204 ML-DSA (CRYSTALS-Dilithium) RSA-PSS, ECDSA Digital signatures / certificates
FIPS 205 SLH-DSA (SPHINCS+) RSA-PSS, ECDSA Stateless hash-based signatures (firmware, backup)

A fourth — FN-DSA (Falcon) — is in draft as FIPS 206 for cases where signature size matters more than verification speed.

What's Live in TLS 1.3 Today

X25519MLKEM768 — the hybrid that won

The current production deployment is a hybrid: classical X25519 ECDH combined with ML-KEM-768. The shared secret is derived from both, so it stays secure if either primitive breaks. The IETF assigned codepoint 0x11EC for this group, published as RFC 9794 (draft-kwiatkowski-tls-ecdhe-mlkem) in early 2025.

Browser and server support, May 2026

Implementation Status Notes
Chrome / Edge Enabled by default Since Chrome 131 (Nov 2024)
Firefox Enabled by default Since Firefox 132 (Oct 2024)
Safari (macOS / iOS) Enabled by default Since Safari 18.2 (Dec 2024) / iOS 18.2
OpenSSL Native support OpenSSL 3.5 LTS (2025)
BoringSSL Native support Powers Chrome, Cloudflare, AWS endpoints
Cloudflare edge Enabled everywhere Reports >40% of TLS 1.3 handshakes are PQ-hybrid
AWS, Google, Apple endpoints Enabled iCloud, GCP load balancers, AWS s2n-tls
nginx (with OpenSSL 3.5) Available, not default Add X25519MLKEM768 to ssl_ecdh_curve

Enabling the hybrid on nginx

# nginx with OpenSSL 3.5+
ssl_protocols TLSv1.3;
ssl_ecdh_curve X25519MLKEM768:X25519:secp256r1;

The hybrid group adds roughly 1.1 KB to the ClientHello and a similar amount to the ServerKeyExchange — the only real cost. CPU overhead is negligible because ML-KEM is fast (often faster than the X25519 it accompanies).

Middlebox hazard. The ClientHello may now exceed a single TCP segment. A handful of older middleboxes drop or corrupt these. Run a real-world test from client networks before forcing PQ-only.

What About Certificates?

Key exchange got PQ-safe first because of harvest-now-decrypt-later. Certificates are next, but the timeline is longer:

  • Let's Encrypt has been issuing experimental ML-DSA-44 certificates from a staging root since late 2025. Production issuance is gated on browser root-store inclusion.
  • Mozilla opened its CCADB programme to PQ roots in early 2026; first inclusion decisions are expected late 2026 / early 2027.
  • Chrome (Chromium) has reserved codepoints and signature schemes; shipping support for PQ certificate validation is in nightly builds.
  • Signature size is the bottleneck. An ML-DSA-65 signature is ~3.3 KB, versus 64 bytes for ECDSA P-256. Full PQ chains will materially increase handshake bytes. Expect hybrid certificates (classical + PQ) as the transitional form.

What You Should Actually Do

If you run servers

  1. Upgrade OpenSSL/BoringSSL. OpenSSL 3.5 LTS is the practical floor.
  2. Add X25519MLKEM768 to your supported groups. Keep classical X25519 in the list so older clients still work.
  3. Test with our PQC checker to confirm the hybrid is being negotiated.
  4. Inventory your high-sensitivity flows. Anything with a 10-year-plus confidentiality requirement should be on PQ today — not after audit.

If you build software

  1. Use modern, vetted libraries (OpenSSL 3.5+, BoringSSL, rustls). Never hand-implement ML-KEM.
  2. Plan for hybrid certificate handling — larger chains, longer handshakes, new signature algorithm IDs.
  3. Audit your dependencies. Many cryptographic libraries pinned to older releases lack PQ support. Pin updates.

If you set policy

  1. NSA CNSA 2.0 requires CNSSP-15 systems to use FIPS 203/204 from 2027, with full migration by 2033.
  2. UK NCSC and BSI Germany published similar transition guidance in 2024–25.
  3. Get the cryptographic inventory done in 2026. Migration in 2027–28. Audit in 2029.
Test Your Server for PQC Readiness
Our free PQC checker negotiates X25519MLKEM768 against your server and reports exactly what it sees — supported groups, hybrid status, and a verdict.
Open PQC Readiness Checker →

Common Misconceptions

"My provider is Cloudflare, I'm fine."

Cloudflare's edge negotiates PQ-hybrid with browsers, but the connection from Cloudflare to your origin is a separate TLS session. If your origin doesn't support PQ, the leg from edge to origin is still harvestable. Enable it on both sides.

"TLS 1.3 already protects me."

TLS 1.3 forward secrecy means a current key-exchange compromise won't expose past sessions — but only if the underlying primitive (X25519) stays secure. Against a future CRQC, X25519 isn't secure. Forward secrecy is necessary, not sufficient.

"This is years away."

The deployment is happening now. Chrome and Firefox have negotiated hundreds of billions of PQ-hybrid handshakes since late 2024. Whether the threat materialises in 2032 or 2042 is a separate question from whether your traffic is being recorded today.

Related Articles