By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
The Tech DiffThe Tech DiffThe Tech Diff
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Reading: AES 128 Stands Strong in the Post-Quantum Era
Share
Font ResizerAa
The Tech DiffThe Tech Diff
Font ResizerAa
  • Computers
  • Phones
  • Technology
  • Wearables
Search
  • Home
  • Shop
  • Computers
  • Phones
  • Technology
  • Wearables
Follow US
  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy
© Copyright 2022. All Rights Reserved By The Tech Diff.
The Tech Diff > Blog > Technology > AES 128 Stands Strong in the Post-Quantum Era
Technology

AES 128 Stands Strong in the Post-Quantum Era

Admin
Last updated: April 22, 2026 2:54 am
Admin
Share
AES 128 Stands Strong in the Post-Quantum Era
SHARE

The Truth About Quantum Computers and Symmetric Key Security

On Monday, Valsorda finally channeled years’ worth of frustration, fueled by the widely held misunderstanding, into a blog post titled “Quantum Computers Are Not a Threat to 128-bit Symmetric Keys.” In a digital landscape teeming with misconceptions, Valsorda aimed to clarify an important point regarding the security of encryption.

Contents
The Truth About Quantum Computers and Symmetric Key SecurityMisconceptions Around Symmetric Key SecurityThe Math Behind the MisunderstandingUnderstanding the Real Security LevelsExpert Insights for Clarity

Misconceptions Around Symmetric Key Security

“There’s a common misconception that quantum computers will ‘halve’ the security of symmetric keys, requiring 256-bit keys for 128 bits of security,” he wrote. “That is not an accurate interpretation of the speedup offered by quantum algorithms, it’s not reflected in any compliance mandate, and risks diverting energy and attention from actually necessary post-quantum transition work.” This highlights a crucial need for clear communication about the implications of quantum computing on cybersecurity.

-90% Unleash Your Workout: NDO Bluetooth 5.3 Waterproof Earbuds!
Headphones

Unleash Your Workout: NDO Bluetooth 5.3 Waterproof Earbuds!

$229.99 Original price was: $229.99.$22.99Current price is: $22.99.
Buy Now
-38% BENFEI 4-in-1 Card Reader: Fast & Versatile for iPhone 15!
Computer & Accessories

BENFEI 4-in-1 Card Reader: Fast & Versatile for iPhone 15!

$15.99 Original price was: $15.99.$9.99Current price is: $9.99.
Buy Now
STREBITO 142-Piece Precision Screwdriver Set: Ultimate Tech Toolkit!
Computer & Accessories

STREBITO 142-Piece Precision Screwdriver Set: Ultimate Tech Toolkit!

$27.99
Buy Now
-18% Ultimate Sports Wireless Headset: Compact, Clear & 12-Hour Life!
Headphones

Ultimate Sports Wireless Headset: Compact, Clear & 12-Hour Life!

$33.99 Original price was: $33.99.$27.99Current price is: $27.99.
Buy Now

The Math Behind the Misunderstanding

The explanation for this misconception lies in the differing methods of brute-force searches on classical computers versus those utilizing Grover’s algorithm. Classical computers can perform multiple searches simultaneously. This capability allows them to break large tasks into smaller ones, completing the overall job faster. In contrast, Grover’s algorithm requires a long-running serial computation, where each search is executed one at a time.

“What makes Grover special is that as you parallelize it, its advantage over non-quantum algorithms gets smaller,” Valsorda explained in an interview. To illustrate this concept, he presented a simplified example:

Imagine it with small numbers, let’s say there are 256 possible combinations to a lock. A normal attack would take 256 tries. You decide it’s too long, so you get three friends, and each of you does 64 tries. This is classical parallelization. With Grover, you could theoretically do √256 = 16 tries in a row. However, if you again sought help from your three friends, each would then need to do √256/4 = 8 tries.

So in total, you would perform 8 * 4 = 32 tries, far exceeding the 16 tries you would have done alone. Therefore, when seeking to parallelize the attack, the process becomes slower overall, a phenomenon not witnessed in classical attacks.

Understanding the Real Security Levels

Of course, the actual numbers are significantly larger. Still, if we impose reasonable constraints on an attacker, such as having to complete a run in 10 years, the total work required exceeds the conventional 2^64. Furthermore, positing 2^64 as a baseline is misleading since it assumes AES can be performed as a single operation on a single qubit, which isn’t the case.

The combination of these observations transforms the actual cost of attacking AES-128 into around 2^104, a number far beyond acceptable security thresholds.

Expert Insights for Clarity

In further clarification, Sophie Schmieg, a senior cryptography engineer at Google, encapsulates this notion succinctly: it is essential to address these misconceptions to maintain trust in cryptographic systems.

For an in-depth read on the topic, check out Valsorda’s blog post and the discussion surrounding it here.

Image Credit: arstechnica.com

You Might Also Like

“Govee’s Rechargeable Table Lamp Costs Less Than Half of Hue’s”

“John Ternus: Apple’s Next CEO and Future Visionary Leader”

“John Ternus Succeeds Tim Cook as Apple’s New CEO”

Supreme Court to Rule on Police Phone Tracking in Chatrie v. US

“OpenAI’s Existential Questions: Addressing the Future of AI Technology”

Share This Article
Facebook Twitter Copy Link Print
Previous Article Website Security Essentials: Trust BigScoots for Protection
Next Article “Special Edition Smartphone Essential for Car Design Enthusiasts” “Special Edition Smartphone Essential for Car Design Enthusiasts”
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Product categories

  • Computer & Accessories
  • Headphones
  • Laptops
  • Phones
  • Wearables

Trending Products

  • Uliptz Bluetooth Headphones: 65H Playtime & 6 EQ Modes! Uliptz Bluetooth Headphones: 65H Playtime & 6 EQ Modes! $19.99 Original price was: $19.99.$14.99Current price is: $14.99.
  • Kurdene Wireless Earbuds: Deep Bass & Crystal Clear Calls! Kurdene Wireless Earbuds: Deep Bass & Crystal Clear Calls! $99.99 Original price was: $99.99.$9.99Current price is: $9.99.
  • ASUS 14” FHD Laptop: Intel Power, Ultimate Portability! ASUS 14” FHD Laptop: Intel Power, Ultimate Portability! $219.00
  • Revolutionary Jumper 2-in-1 Laptop: 16″ Touchscreen & Power! Revolutionary Jumper 2-in-1 Laptop: 16" Touchscreen & Power! $1,333.17 Original price was: $1,333.17.$399.99Current price is: $399.99.
  • Revolutionize Your Walk: Laptop Harness for On-the-Go Creativity! Revolutionize Your Walk: Laptop Harness for On-the-Go Creativity! $43.99 Original price was: $43.99.$41.99Current price is: $41.99.

You Might also Like

“Big Tech Advances Risk Triggering Q-Day Threat Level”
Technology

“Big Tech Advances Risk Triggering Q-Day Threat Level”

Admin Admin 2 Min Read
“RAM Shortage May Persist for Years Ahead”
Technology

“RAM Shortage May Persist for Years Ahead”

Admin Admin 3 Min Read
“Make a Difference: Transform Your Life and Impact the World”
Technology

“Make a Difference: Transform Your Life and Impact the World”

Admin Admin 12 Min Read

About Us

At The Tech Diff, we believe technology is more than just innovation—it’s a lifestyle that shapes the way we work, connect, and explore the world. Our mission is to keep readers informed, inspired, and ahead of the curve with fresh updates, expert insights, and meaningful stories from across the digital landscape.

Useful Link

  • Shop
  • About
  • Contact
  • Terms & Conditions
  • Privacy Policy

Categories

  • Computers
  • Phones
  • Technology
  • Wearables

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

The Tech DiffThe Tech Diff
Follow US
© Copyright 2022. All Rights Reserved By The Tech Diff.
Welcome Back!

Sign in to your account

Lost your password?