Post-Quantum Encryption Is Entering VPN Standards: What Changed

18.04.2026 7
Post-Quantum Encryption Is Entering VPN Standards: What Changed

Quantum computers have not yet broken a single VPN - but the race has already begun. In 2024, NIST approved the first post-quantum cryptography standards in history, and leading VPN providers have started implementing them. This changes everything: the encryption that protected you yesterday may become obsolete tomorrow.

What is post-quantum encryption

Modern VPNs use cryptography based on mathematical problems that are practically impossible for classical computers to solve - factoring large numbers into prime factors (RSA) or discrete logarithms (ECC). A quantum computer with a sufficient number of qubits will solve these problems in minutes using Shor's algorithm.

Post-quantum cryptography (PQC) is a new generation of algorithms resistant to attacks from both classical and quantum machines. They are built on different kinds of mathematical problems: lattice-based cryptography, hash functions, coding theory - problems for which quantum computers have no equivalent of Shor's algorithm.

NIST standards: August 2024

In August 2024, the U.S. National Institute of Standards and Technology (NIST) published the first three finalized PQC standards:

  • ML-KEM (CRYSTALS-Kyber) - key encapsulation mechanism, replacing RSA/ECDH in key exchange
  • ML-DSA (CRYSTALS-Dilithium) - digital signature algorithm
  • SLH-DSA (SPHINCS+) - hash-based signature, backup option

In March 2025, NIST selected the HQC (Hamming Quasi-Cyclic) algorithm for standardization as a backup KEM - insurance in case vulnerabilities are found in ML-KEM. Finalization of documentation is ongoing.

⚠️ "Harvest now, decrypt later": intelligence agencies can already record encrypted traffic today to decrypt it in 10-15 years, when quantum computers become powerful enough. Data with a long sensitivity horizon is at risk right now.

Who has already implemented it: NordVPN and ExpressVPN lead the way

NordVPN was one of the first commercial VPN providers to implement PQC. In 2024, ML-KEM support appeared in the NordLynx protocol (based on WireGuard) for Linux, and in 2025 coverage expanded to all platforms: Windows, macOS, iOS, Android, Android TV, and tvOS. Post-quantum authentication is planned for 2026 - so that protection covers not only encryption but also identity verification.

ExpressVPN integrated ML-KEM into its proprietary Lightway protocol, using keys at NIST Security Level 5 - the maximum protection level. Implementation rolled out simultaneously across all platforms (Android, iOS, Linux, Mac, Windows) without a noticeable impact on connection speed.

WireGuard + Rosenpass: open standard

For WireGuard users, there is an open extension called Rosenpass - a separate daemon that adds post-quantum key exchange on top of standard WireGuard. Rosenpass uses Classic McEliece and Kyber/ML-KEM simultaneously, implementing the principle of hybrid cryptography: even if one of the algorithms is compromised, the connection is protected by the other.

Most providers are falling behind

Despite the standards being finalized, the majority of commercial VPNs as of early 2026 have still not implemented post-quantum protection. Cisco plans to support ML-KEM in enterprise products (ASA, FTD, AnyConnect/Secure Client) within IKEv2 - rollout expected with upcoming updates. Cloudflare applies ML-KEM in both HTTPS and its WARP VPN client - one of the first in the industry to do so.

This means: if your VPN provider does not mention ML-KEM or post-quantum protection - there is a high probability you have not received it yet.

What this means for you

  • When choosing a VPN, check for ML-KEM / post-quantum encryption support in the protocols
  • Hybrid schemes (classical + PQC simultaneously) are currently safer than classical-only
  • If you work with data that is sensitive over a 10+ year horizon - act now
  • Changing standards requires updating client applications - keep your VPN updated
Bottom line: The quantum threat is not tomorrow, but the day after tomorrow. But "record now, decrypt later" attacks are relevant today. Providers implementing ML-KEM now give their users protection with a decade of headroom.
Tags: post-quantum encryption ML-KEM NIST VPN NordVPN ExpressVPN WireGuard quantum security

Read also