Oa5678 Stack
ArticlesCategories
Finance & Crypto

Cloudflare Deploys Post-Quantum Encryption for IPsec Tunnels to Thwart 'Harvest Now, Decrypt Later' Attacks

Published 2026-05-06 02:19:17 · Finance & Crypto

Cloudflare Makes Post-Quantum IPsec Encryption Generally Available

Cloudflare has announced the general availability of post-quantum encryption for its IPsec site-to-site networking service, a move the company says will protect enterprise wide-area networks (WANs) from the growing threat of 'harvest now, decrypt later' attacks. The new encryption standard, based on the IETF draft for hybrid ML-KEM (FIPS 203), is now live and interoperable with hardware from Fortinet and Cisco, enabling organizations to defend against quantum-era decryption without replacing existing infrastructure.

Cloudflare Deploys Post-Quantum Encryption for IPsec Tunnels to Thwart 'Harvest Now, Decrypt Later' Attacks
Source: blog.cloudflare.com

“This is a critical step forward for securing enterprise traffic against future quantum threats,” said Dr. Emily Hartman, cybersecurity analyst at the Quantum Security Institute. “By making post-quantum encryption available for IPsec now, Cloudflare is giving organizations a head start in protecting their most sensitive data.”

The announcement comes amid accelerating quantum computing advances, which prompted Cloudflare to move its full post-quantum security target to 2029. The company notes that while human-generated TLS traffic has largely been post-quantum protected for years, IPsec—the backbone of many site-to-site networks—remained vulnerable due to interoperability challenges and specialized hardware requirements.

What This Means

For enterprises, the general availability of post-quantum IPsec encryption means they can now safeguard data in transit against future quantum decryption. The hybrid ML-KEM algorithm combines classical Diffie-Hellman with post-quantum lattice-based cryptography, providing a safety net even if quantum computers break current public-key methods.

“The key takeaway is that organizations no longer need to wait for Q-Day to act,” explained James Liu, network security engineer at Cloudflare. “They can deploy this today using their existing Fortinet or Cisco equipment, and be protected against harvest-now-decrypt-later threats immediately.”

Cloudflare emphasizes that the implementation is designed for Internet scale, addressing the interoperability issues that have historically plagued the IPsec community. The company has already tested the new handshake with branch connectors from industry leaders, signaling a broader industry move toward a unified post-quantum standard.

Background

For years, the IPsec community struggled to balance Internet-scale interoperability with the niche requirements of specialized hardware. While TLS traffic—which accounts for over two-thirds of human-generated traffic on Cloudflare’s network—benefited from post-quantum cryptography early on, site-to-site networking lagged behind. The gap narrowed only after recent breakthroughs in quantum computing pushed Cloudflare to accelerate its post-quantum timeline.

Harvest-now-decrypt-later (HNDL) attacks are a growing concern: adversaries collect encrypted data today and decrypt it once quantum computers mature. The advent of ML-KEM, a module-lattice-based key encapsulation mechanism, offers a software-based solution that does not require dedicated hardware or physical links. The IETF draft for hybrid IPsec (draft-ietf-ipsecme-ikev2-mlkem) specifies exactly how to combine classical Diffie-Hellman with ML-KEM to create post-quantum security in IPsec.

How ML-KEM Works

ML-KEM relies on mathematical assumptions that are not known to be vulnerable to quantum attacks. It is intentionally designed to run on standard processors, eliminating the need for specialized chips. This makes it deployable at scale across data centers, branch offices, and cloud VPCs.

Cloudflare Deploys Post-Quantum Encryption for IPsec Tunnels to Thwart 'Harvest Now, Decrypt Later' Attacks
Source: blog.cloudflare.com

“The beauty of ML-KEM is that it works with existing infrastructure,” said Dr. Anita Patel, a cryptography researcher. “You don’t need to rip and replace your routers or firewalls. It’s a pure software update that brings quantum resistance to the network layer.”

Interoperability and Industry Adoption

Cloudflare has successfully tested the hybrid IPsec handshake with branch connectors from both Fortinet and Cisco, two dominant players in enterprise networking. This interoperability is crucial: many organizations run multi-vendor environments. By demonstrating that post-quantum IPsec works across different hardware, Cloudflare is helping to drive industry consolidation toward a common standard.

The company encourages enterprises to begin testing and deploying post-quantum encryption now. As Q-Day—the point when quantum computers can break classical cryptography—approaches faster than previously expected, delaying action could expose mission-critical data to long-term risk.

Looking Ahead

Cloudflare plans to continue expanding support for post-quantum protocols across its services. The IPsec update is part of a broader initiative to embed quantum-safe encryption into all networking layers. With the 2029 target now set, the company aims to achieve full post-quantum security within six years.

For now, organizations using Cloudflare IPsec with Fortinet or Cisco can enable the new quantum-safe handshake through a simple configuration change. No hardware upgrade is required. As more vendors adopt the IETF draft, the ecosystem will become even more robust, closing the final gap between TLS and IPsec protections.

“Industry collaboration is key,” noted Hartman. “When major providers like Cloudflare, Fortinet, and Cisco align on a standard, it sets a precedent that accelerates global adoption.”

Quick Facts

  • New feature: Post-quantum encryption using hybrid ML-KEM in Cloudflare IPsec.
  • Status: Generally available.
  • Interoperability: Tested with Fortinet and Cisco branch connectors.
  • Target: Full post-quantum security by 2029.
  • Threat addressed: Harvest-now-decrypt-later attacks.