Several network devices containing middleware are creating website connection problems.
The Combined Elliptic-Curve and Post-Quantum 2 (CECPQ2) quantum security feature in the Chrome browser has been stopped by Google experts. Experts have discovered that a number of network devices containing middleware are causing unexpected website connection failures for some CECPQ2 customers.
The Combined Elliptic-Curve and Post-Quantum 2 algorithms are intended to improve cryptography for TLS connections. In the future, when quantum computers become widely available, attackers will be unable to decrypt HTTPS traffic and get access to prior protected chats.
CECPQ2 was created in conjunction with Cloudflare developers in 2016 and will be integrated in Chrome 91 this May. To enhance the secured HTTPS connection, the innovation adds isogeny-based key agreements to Chrome’s TLS negotiation component.
The problem happened as a result of CECPQ2 producing huge TLS packets. According to Google, some communication software devices are unable to handle these packets, resulting in unanticipated connection disruptions.
With the release of Chrome 93, Google has stated that CECPQ2 would be temporarily disabled for all users. This will enable the firm to collaborate with the suppliers of the impacted middleware devices in order to deliver the necessary patches. CECPQ2 will stay disabled in Chrome 93 and 94.
Users that wish to continue using CECPQ2 can do so by setting the following Chrome flag to “Enabled”