<s>
In	O
cryptography	O
,	O
CECPQ1	B-Protocol
(	O
combined	O
elliptic-curve	O
and	O
post-quantum	O
1	O
)	O
is	O
a	O
post-quantum	O
key-agreement	B-Protocol
protocol	I-Protocol
developed	O
by	O
Google	B-Application
as	O
a	O
limited	O
experiment	O
for	O
use	O
in	O
Transport	B-Protocol
Layer	I-Protocol
Security	I-Protocol
(	O
TLS	O
)	O
by	O
web	B-Application
browsers	I-Application
.	O
</s>
<s>
It	O
was	O
succeeded	O
by	O
CECPQ2	B-Protocol
.	O
</s>
<s>
CECPQ1	B-Protocol
was	O
designed	O
to	O
test	O
algorithms	O
that	O
can	O
provide	O
confidentiality	O
even	O
against	O
an	O
attacker	O
who	O
possesses	O
a	O
large	O
quantum	B-Architecture
computer	I-Architecture
.	O
</s>
<s>
It	O
is	O
a	O
key-agreement	B-Protocol
algorithm	I-Protocol
for	O
TLS	O
that	O
combines	O
X25519	B-Application
and	O
NewHope	B-Protocol
,	O
a	O
ring	O
learning	O
with	O
errors	O
primitive	O
.	O
</s>
<s>
Even	O
if	O
NewHope	B-Protocol
were	O
to	O
turn	O
out	O
to	O
be	O
compromised	O
,	O
the	O
parallel	O
X25519	B-Application
key-agreement	O
ensures	O
that	O
CECPQ1	B-Protocol
provides	O
at	O
least	O
the	O
security	O
of	O
existing	O
connections	O
.	O
</s>
<s>
It	O
was	O
available	O
in	O
Google	B-Application
Chrome	I-Application
54	O
beta	O
.	O
</s>
<s>
In	O
2016	O
,	O
its	O
experimental	O
use	O
in	O
Chrome	B-Application
ended	O
and	O
it	O
was	O
planned	O
to	O
be	O
disabled	O
in	O
a	O
later	O
Chrome	B-Application
update	O
.	O
</s>
<s>
It	O
was	O
succeeded	O
by	O
CECPQ2	B-Protocol
.	O
</s>
