Proton Mail Launches Post-Quantum Encryption to Protect Against Future Threats
Key Takeaways
- ▸Post-quantum encryption is now available as an optional upgrade on all Proton Mail plans, including free accounts
- ▸The update supports OpenPGP v6 and protects against theoretical attacks from future quantum computers using algorithms like Shor's
- ▸Proton Mail is collaborating with other email providers and projects like Thunderbird to standardize post-quantum encryption across the ecosystem
Summary
Proton Mail has introduced post-quantum encryption as an optional feature across all subscription tiers, including its free plan. The email service now allows users to generate and use post-quantum-ready cryptographic keys designed to protect communications against threats from future quantum computers. While current encryption standards such as RSA and ECC remain secure against contemporary computing capabilities, large-scale quantum computers could theoretically break these schemes using quantum algorithms like Shor's algorithm. By implementing post-quantum cryptography (PQC), Proton Mail is taking a proactive stance to safeguard user communications against potential future threats.
The implementation includes support for OpenPGP v6, a modern framework that enables advanced algorithm support including post-quantum standards. Proton Mail is also collaborating with the broader email ecosystem—including projects like Thunderbird—to standardize quantum-safe encryption across different email providers, ensuring protections work seamlessly between services rather than only within Proton's platform. Users can easily enable PQC protection, generate additional keys as needed, and manage them similarly to existing RSA or ECC keys. The feature protects new encrypted emails prospectively, though it does not retroactively re-encrypt existing mailbox contents.
The move reflects industry-wide preparation for a security transition that experts expect to accelerate before quantum computing becomes mainstream. Security teams and standards bodies are already mitigating the 'store now, decrypt later' threat, where adversaries collect encrypted data today with the intent to decrypt it once quantum computing capabilities advance sufficiently.
- Proactive adoption is driven by the 'store now, decrypt later' threat, where attackers collect encrypted data today for future decryption



