Takeaways from the WWDC25 video on PQC:
- Apple PQC strategy is hybrids, both for encryption and signing, as well as moving to 256-bit keys
- Recommended high-level PQC CryptoKit API is use of HPKE with XWingMLKEM768X25519_SHA256_AES_GCM_256 cipher suite
- App development case study mentions end-to-end encryption multiple times, sample code uses PQ HPKE, but case study lacks coverage of integrity risks / spoofed payloads
- Hybrid PQC signatures are recommended but are left to the application to implement
- TLS with PQC support shipping in iOS 26, including in Safari and various frameworks (PQC enabled by default in URLSession and Network.framework)
- Commitment of back-end support – 'enabled on the client side and rolling out on the server side' – but no timelines given
- Call-out of CloudKit, Apple Push Notifications, and iCloud Private Relay system services enabling PQC in TLS
- Safari, Weather, and Maps called out as examples of apps handling sensitive user data for which TLS PQC support will be rolled out
- Secure Enclave support for ML-KEM and ML-DSA operations
- No specification yet of which TLS key exchange will be supported (but given the inclusion of XWingMLKEM768X25519_SHA256_AES_GCM_256 in CryptoKit, I'm guessing at least X25519MLKEM768)
- No mention of macOS, iPadOS, etc.