Top
Best
New

Posted by tatersolid 10/28/2025

Keeping the Internet fast and secure: introducing Merkle Tree Certificates(blog.cloudflare.com)
215 points | 92 commentspage 2
JackSlateur 10/30/2025|
Quote:

  MTC also supports certificates that can be issued immediately and don’t require landmarks to be validated, but these are not as small. A server would provision both types of Merkle tree certificates, so that the common case is fast, and the exceptional case is slow, but at least it’ll work.
I am not so sure about the "exceptional" part

If the landmarks are generated not so often (say, once every couple of days), then the many clients will need to take the slow path

If the landmarks is generated quickly (once per hour ?), then the client will continuously download those landmarks

bwesterb 11/1/2025|
Landmarks are generated every hour, but I expect clients to pull them perhaps once or twice per day. Servers will keep two signatureless MTCs around a few days apart, so even if your client didn't update in a few days you can still use the small signatureless cert. The biggest reason for needing the big MTCs is for when you need a new certificate quickly. Our intern Lena had a look how common that would be, and she estimates it'd be required for 0.1% at any given time. https://www.youtube.com/watch?si=72ClhykaYDHf0sND&v=f8unMB2Q...
bawolff 10/29/2025||
Has the day finally arrived where "blockchain technology" is actually useful for something?

(I know its controversial what a blockchain even is, but this seems sufficiently close to how cryptocurrencies work to count)

snowwrestler 10/29/2025||
It’s probably more accurate to say that cryptocurrencies and this approach to TLS certs share common ancestors.
layer8 10/29/2025||
Merkle trees have been used in the cryptographic archiving space for a long time (see RFC 4998 for example), they don’t equate to blockchains.
itopaloglu83 10/29/2025||
Here’s what I’m not following in general about the Post Quantum encryption studies.

Don’t we already just use the certificates to just negotiate the final encryption keys? Wouldn’t a quantum computer still crack the agreed upon keys without the exchange details?

mcpherrinm 10/29/2025||
Yes, the rest of the cryptography needs to be PQ-secure as well.

But that's largely already true:

The key exchange is now typically done with X25519MLKEM768, a hybrid of the traditional x25519 and ML-KEM-768, which is post-quantum secure.

The exchanged keys typically AES-128 or AES-256 or ChaCha20. These are likely to be much more secure against quantum computers as well (while they may be weakened, it is likely we have plenty of security margin left).

Changing the key exchange or transport encryption protocols however is much, much easier, as it's negotiated and we can add new options right away.

Certificates are the trickiest piece to change and upgrade, so even though Q-day is likely years away still, we need to start working on this now.

Upgrading the key exchange has already happened because of the risk of capture-now, decrypt-later attacks, where you sniff traffic now and break it in the future.

jcgl 10/30/2025|||
> The key exchange is now typically done with X25519MLKEM768, a hybrid of the traditional x25519 and ML-KEM-768, which is post-quantum secure.

How "typical" are you suggesting this is? Honestly, it's the first I'd heard of this being done at all in the wild (not that I'm an expert). Peeking around a smattering of random websites in my browser, I'm not seeing it mentioned at all.

itopaloglu83 10/30/2025|||
> Changing the key exchange or transport encryption protocols however is much, much easier, as it's negotiated and we can add new options right away.

So that’s a good point. We can quickly add new encryption protocols after the point things are negotiated in the connection, but adding something new or entirely replacing the certificate system or even just the underlying protocols is a big deal.

NoahZuniga 10/29/2025|||
While quantum computing weakens AES encyption, AES 256 bit can't be cracked by quantum computers.
MangoToupe 10/29/2025|||
Not practically, anyway, and even with absurd advances we can just grow the key sizes.
bwesterb 11/1/2025|||
AES-128 also can't be cracked by quantum computers.
mtoner23 10/29/2025|||
No the agreed upon keys are symmetric encryption keys with like an AES cipher and we don't have any reason to believe the current encryption there is easier to calculate with a quantum computer
itopaloglu83 10/30/2025||
Okay, it makes some sense now. I always assumed that quantum computing would make any encryption scheme less secure, but that’s not the case.
throwaway89201 10/29/2025|||
> Don’t we already just use the certificates to just negotiate the final encryption keys?

No, since forward secret key agreement the certificate private key isn't involved at all in the secrecy of the session keys; the private key only proves the authenticity of the connection / the session keys.

itopaloglu83 10/30/2025||
I meant to say agreed upon encryption protocol, not keys.

Certificates are commonly used to negotiate a symmetric key which I presumed would be vulnerable to quantum computing as well, but apparently AES has some more buffer and also it’s easier to add new negotiated protocols.

jokoon 10/29/2025||
Are we already talking about attackers having access to quantum computers?

I could see government agencies with a big budget having access to it, but I don't see those computers becoming mainstream

Although I could see China having access to it, which is problem.

mcpherrinm 10/29/2025||
The migration here is going to be long.

Chrome and Cloudflare are doing a MTC experiment this year. We'll work on standardizing over the next year. Let's Encrypt may start adding support the year after that. Downstream software might start deploying support MTCs the year after that. People using LTS Linux distros might not upgrade software for another 5 years after that. People run out-of-date client devices for another 5 years too.

So even in that timeline, which is about as fast as any internet-scale migration goes, it may be 10-15 years from today for MTC support to be fully widespread.

bwesterb 11/1/2025||
Yeah, this is going to take time. That is why we're starting now.
mtoner23 10/29/2025|||
The fear is attackers are recording conversations today in the hopes that they can crack the encryption when we do have quantum computers in a few years
mcpherrinm 10/29/2025||
Capture-now Decrypt-later isn't really relevant to certificates, who mostly exist to defend against active MITM. The key exchange algorithms need to be PQ-secure for CN-DL, but that has already happened if you have an up-to-date client and server.
tptacek 10/29/2025|||
No. Nobody serious that I know of thinks Q-day has occurred or will occur in 2025. The more typical question is whether we're 10, 50, or 100 years away from it.
phire 10/29/2025||
I’m of the opinion that it’s unlikely to happen within 50 years.

But I still think it’s a good idea to start switching over to post-quantum encryption, because the lead time is so high. It could easily take a full 10 years to fully implement the transition and we don’t want to be scrambling to start after Q-day.

sunsetonsaturn 10/29/2025||
> 10 years

Moving from SHA-1 to SHA-2 took ~20 years - and that's the "happy path", because SHA-2 is a drop-in replacement.

The post-quantum transition is more complex: keys and signatures are larger; KEM is a cryptographic primitive with a different interface; stateful signature algorithms require special treatment for state handling. It can easily take more than 20 years.

HexDecOctBin 10/29/2025|||
> Although I could see China having access to it, which is problem.

I can see USA having access to it, which is also a problem. Or any other government.

rynn 10/29/2025|||
Seems like you answered your own question
squigz 10/29/2025||
How is China having access to it any different than, say, America?
jokoon 10/29/2025||
I trust american institutions more than I trust chinese institutions
dur-randir 10/29/2025||
Keeping internet locked, you mean?
portaouflop 10/29/2025||
Danke Merkle
nacozarina 10/29/2025||
share your design, sure, but there is no reason to suggest Q-day is imminent, the fear-mongering is utterly absurd.
rvz 10/28/2025||
[flagged]
tomrod 10/28/2025|
... Why is this the first place to go?
oasisbob 10/29/2025||
Regardless of the strengths of this, I can't read this slop. A third of the way in, and:

> Instead of expecting the client to know the server's public key in advance, the server might just send its public key during the TLS handshake. But how does the client know that the public key actually belongs to the server? This is the job of a certificate.

Are you kidding me? You don't know your audience on an article at the nexus of certificate transparency and post-quantum cryptography well-enough to understand that this introduction to PKI isn't required?

Know your audience. Turning over your voice to an AI doesn't do that for you. It will waste everyone's time on thousands of words of vapid nonsense.

jgrahamc 10/29/2025||
When I was the editor in chief of the Cloudflare blog we had a very, very strong mission to "educate, educate, educate" our readers. That often meant including details that someone versed in the field would skip over or find too basic. After all, we were writing for a general technical audience interested in learning about a topic.

So, its natural that some readers would find parts over-explanatory but the hope was that they could read past those bits and the less educated reader would come away having learnt something new.

oasisbob 11/2/2025||
I can understand wanting to give background. There's still a place where it's too long and verbose.

The pacing and verbosity makes me really doubt this underwent extensive editing.

flufluflufluffy 10/29/2025||
I for one welcomed the refresher as I don’t often deal with the intricacies of the public key infrastructure, even though yes I am a programmer and make websites.
megous 10/29/2025|
Ah cloudflare. But who will protect us against cloudflare???

It's a privacy violating proxy after all.

thhoooowww0101 10/29/2025|
What's so special about cloudflare? Everyone from AWS to Akamai offers the same "reverse proxy" service.
layer8 10/29/2025|||
Their market share: https://w3techs.com/technologies/details/cn-cloudflare
bwesterb 11/1/2025||||
Also MTC is usable for everyone. Perfectly fits an automation-forward webserver like Caddy.
megous 10/29/2025|||
Did I say there's something special about them?
thhoooowww0101 10/29/2025||
Maybe I misunderstood your comment. Traffic wise, I'm not sure if they're ahead of other "privacy violating" proxy services, so I was wondering if there's something special about Cloudflare. They're all MITM traffic after all.