Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Diablo 4: Lord of Hatred review – A compelling conclusion delivered with a panache that proves Blizzard still got it

    April 22, 2026

    John Cena’s ‘Coyote vs. Acme’ Finally Releases First Trailer After Being Saved From Cancellation

    April 22, 2026

    Electric Ferrari Luce Price Allegedly Leaked

    April 22, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Contrary to popular superstition, AES 128 is just fine in a post-quantum world
    Contrary to popular superstition, AES 128 is just fine in a post-quantum world
    Tech Reviews

    Contrary to popular superstition, AES 128 is just fine in a post-quantum world

    gvfx00@gmail.comBy gvfx00@gmail.comApril 22, 2026No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    On Monday, Valsorda finally channeled years’ worth of frustration, fueled by the widely held misunderstanding, into a blog post titled “Quantum Computers Are Not a Threat to 128-bit Symmetric Keys.”

    “There’s a common misconception that quantum computers will ‘halve’ the security of symmetric keys, requiring 256-bit keys for 128 bits of security,” he wrote. “That is not an accurate interpretation of the speedup offered by quantum algorithms, it’s not reflected in any compliance mandate, and risks diverting energy and attention from actually necessary post-quantum transition work.”

    That’s the easy part of the argument. The much harder part is the math and physics that explain it. At its highest level, it comes down to a fundamental difference in the way a brute-force search works on classical computers versus the way it works using Grover’s algorithm. Classical computers can perform multiple searches simultaneously, a capability that allows large tasks to be broken into smaller pieces to complete the overall job faster. Grover’s algorithm, by contrast, requires a long-running serial computation, where each search is done one at a time.

    “What makes Grover special is that as you parallelize it, its advantage over non-quantum algorithms gets smaller,” Valsorda said in an interview. He continued:

    Imagine it with small numbers, let’s say there are 256 possible combinations to a lock, A normal attack would take 256 tries. You decide it’s too long, so you get three friends and you each do 64 tries. “That’s the classical parallelization. With Grover you could in theory do √256)=16 tries in a row, but if that’s still too long and you again look for help from three friends. Each has to do √256/4)=8 tries.

    So in total you do 8*4=32 tries, which is more than the 16 you would have done alone! Asking for help to parallelize the attack made the attack slower overall. Which is not the case for classical attacks.

    Of course the numbers are way larger, but if we apply any reasonable constraint on the attacker (like having to finish a run in 10 years), the total work becomes so much more than 264.

    Also, 264 was never the right number, because that pretends you can do AES as a single operation on a single qubit. This is somewhat orthogonal. The combination of these two observations turn the actual cost into 2104 give or take, which is well beyond the threshold for security.

    Sophie Schmieg, a senior cryptography engineer at Google, explained it this way:

    Table of Contents

    Toggle
      • Related posts:
    • Razer's new Blade 16 has Intel's latest chips and ultra-fast RAM
    • Your last chance to play Black Ops 7 before release is to book a slot at this free matcha pop-up
    • Apple is reportedly looking into 3D printing aluminum iPhones and Apple Watches

    Related posts:

    A single click mounted a covert, multistage attack against Copilot

    Apple will finally start building Mac mini computers in the U.S., significantly reshaping desktop, w...

    Nation-state hackers deliver malware from “bulletproof” blockchains

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleI Love This ‘Game Show’ That’s Basically Dropout For Word Nerds
    Next Article 5 Free Ways to Host a Python Application
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    SpaceX and Cursor strike partnership that might end in a $60 billion acquisition

    April 22, 2026
    Tech Reviews

    NymVPN Adds Split-Tunneling Feature for Windows Customers

    April 21, 2026
    Tech Reviews

    Former Obdisian creative officer says not to bet on a Fallout: New Vegas remake, because Bethesda doesn’t have ‘the engineering know-how’ to create it, and may not have the source code

    April 21, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025138 Views

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025138 Views

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.