Overview
Quantum-resistant tunnels add an additional layer of encryption to WireGuard connections using post-quantum cryptography. This protects your VPN traffic from potential future attacks by quantum computers that could break current encryption algorithms. Mullvad implements quantum resistance through ephemeral pre-shared keys (PSK) negotiated using post-quantum key encapsulation mechanisms (KEM).Quantum-resistant tunnels are available on all platforms: Windows, Linux, macOS, Android, and iOS.
How It Works
Traditional WireGuard Encryption
Standard WireGuard uses:- Curve25519: Elliptic curve cryptography for key exchange
- ChaCha20-Poly1305: Symmetric encryption
Quantum-Resistant Enhancement
Mullvad adds a quantum-resistant layer:- Post-Quantum KEM: Generates ephemeral key pairs using post-quantum algorithms
- PSK Exchange: Securely negotiates a pre-shared key with the relay server
- WireGuard PSK: The negotiated key is used as WireGuard’s pre-shared key field
- Hybrid Security: Combined classical (Curve25519) + post-quantum cryptography
This “hybrid” approach provides security even if either the classical or post-quantum algorithm is compromised.
Key Exchange Process
Ephemeral PSK Negotiation
The PSK is never persisted to disk and is regenerated for each tunnel:- Key Generation: Client generates post-quantum KEM key pairs
- Request: Client sends public key to relay server via TLS 1.3
- Encapsulation: Server generates shared secret and encapsulates it
- Response: Server returns encapsulated secret
- Decapsulation: Client decapsulates to derive shared secret
- PSK Derivation: Shared secret becomes WireGuard PSK
Enabling Quantum-Resistant Tunnels
Using the GUI
Using the CLI
Verify It’s Active
When connected with quantum resistance enabled:Performance Impact
Connection Establishment
- Slight increase in connection time: Additional PSK negotiation adds ~100-200ms
- Key generation: Post-quantum key pair generation takes a few milliseconds
Ongoing Connection
- No throughput impact: Once established, performance is identical to standard WireGuard
- No additional CPU overhead: PSK is used in existing WireGuard encryption
The performance impact is minimal and only affects the initial connection. Once connected, there’s no difference in speed or bandwidth.
Security Properties
Threat Model
Quantum-resistant tunnels protect against:- Store-now-decrypt-later attacks: Adversaries recording encrypted traffic today to decrypt with future quantum computers
- Future quantum cryptanalysis: Breaks in classical ECC algorithms
Cryptographic Algorithms
Mullvad uses NIST-approved post-quantum algorithms for KEM:- Post-quantum key encapsulation mechanisms
- Hybrid construction combining classical and post-quantum security
Limitations
Compatibility with Other Features
Quantum-resistant tunnels work with:- ✅ WireGuard multihop
- ✅ DAITA
- ✅ Obfuscation protocols (TCP, Shadowsocks, QUIC)
- ✅ Split tunneling
- ✅ Custom DNS
- ✅ Content blockers
Example: Quantum-Resistant Multihop
Technical Details
PSK Storage
From the source code (talpid-types/src/net/wireguard.rs:295-306):- PSK is 32 bytes (256 bits)
- Automatically zeroized on drop (secure memory cleanup)
- Never serialized or deserialized to disk
Key Rotation
PSKs are ephemeral:- New PSK negotiated for each tunnel connection
- PSK is discarded when tunnel disconnects
- No persistent key storage
Troubleshooting
Connection Failures
If quantum-resistant connections fail:- Check server support: Ensure selected relay supports quantum resistance
- Network connectivity: PSK exchange requires API connectivity
- Firewall rules: Ensure HTTPS (443) to Mullvad API is allowed
- Temporary disable: Try disabling quantum resistance to isolate the issue
Verification
Migration from Legacy Settings
Older Mullvad versions useduse_pq_safe_psk setting:
- Automatically migrated to
quantum_resistantin newer versions autosetting means enabled by default- Settings persist across app updates
Best Practices
- Maximum Security
- Performance Optimized
Enable all quantum-resistant features:
Further Reading
- Mullvad’s Post-Quantum Blog Announcement
- NIST Post-Quantum Cryptography Standardization
- WireGuard PSK Documentation
Related Features
- WireGuard Protocol - Base VPN protocol
- Multihop - Route through multiple servers
- DAITA - Defeat traffic analysis
- Obfuscation - Bypass VPN blocking