Security & Privacy

AES 128 Fine Post-Quantum: Myth Busted

Is AES-128 doomed by quantum computers? Not according to cryptography engineer Filippo Valsorda, who dismantles the hype around Grover's algorithm. The real story lies in how parallelization shields this encryption staple.

{# Always render the hero — falls back to the theme OG image when article.image_url is empty (e.g. after the audit's repair_hero_images cleared a blocked Unsplash hot-link). Without this fallback, evergreens with cleared image_url render no hero at all → the JSON-LD ImageObject loses its visual counterpart and LCP attrs go missing. #}
Quantum computer chip with AES encryption code overlay, symbolizing post-quantum security resilience

Key Takeaways

  • AES-128 remains secure post-quantum; Grover's doesn't enable practical attacks due to parallelization limits.
  • Myth stems from amateurs misapplying Grover's algorithm, ignoring quantum architecture constraints.
  • Prioritize asymmetric crypto migration over symmetric like AES; 128-bit is the efficiency sweet spot.

What if the quantum apocalypse for your encrypted data isn’t coming for AES-128—at least not how the internet thinks?

Filippo Valsorda, a cryptography engineer with a knack for cutting through noise, just did that. He’s calling out a stubborn superstition: that AES-128, the workhorse of modern encryption, gets gutted by quantum computers. Forget the doomsayers. This block cipher—adopted by NIST in 2001—holds up just fine in a post-quantum world.

And here’s why that matters. AES-128 strikes that perfect balance: enough security without hogging computational resources. No known vulnerabilities in three decades. Brute-forcing its 2^128 keys? Picture harnessing every Bitcoin miner on the planet in 2026. Still takes 9 billion years.

Why Does Everyone Think AES-128 Is Quantum Toast?

Grover’s algorithm. That’s the culprit. Over the last decade, amateur cryptographers mangled it into a prophecy of doom. They claim a cryptographically relevant quantum computer (CRQC) slashes AES-128’s strength to 2^64—breakable in seconds with Bitcoin-level hashpower.

Wrong. Spectacularly so.

Valsorda zeros in on the flaw: parallelization. Grover’s doesn’t magically halve the keyspace in a way that lets you divvy up the work like ASIC clusters. Quantum machines can’t just scale like that. The math doesn’t bend to fit the myth.

“Amateur cryptographers and mathematicians twisted a series of equations known as Grover’s algorithm to declare the death of AES 128 once a cryptographically relevant quantum computer (CRQC) came into being.”

That’s Valsorda, nailing the misinformation dead-on. It’s not malice—it’s misunderstanding. But it spreads like digital folklore.

The Architecture That Saves AES

Dig deeper. AES-128 thrives because brute-force remains the sole attack vector. Quantum tweaks via Grover offer a quadratic speedup—impressive on paper, useless in practice without godlike parallelism.

Classical attacks parallelize effortlessly: spin up a million GPUs, each hunting a key slice. Quantum? Grover’s search is inherently sequential in key exhaustion terms. You can’t shard the oracle queries across qubits like mining rigs. The architecture resists.

Compare it to RSA or ECC, where Shor’s algorithm obliterates them by factoring big numbers exponentially faster. AES? Symmetric cipher. Grover’s mere square-root boost leaves 2^64 effective security—still planetary-scale effort. Bitcoin miners cracking it in a second? Pure fantasy. Those ASICs don’t quantum-tunnel.

Valsorda doesn’t mince words. AES-128 meets security needs without 256-bit overhead (slower, hungrier). It’s the sweet spot, quantum or not.

Post-quantum migration dominates headlines—NIST’s new suites like Kyber for keys, Dilithium for signatures. Symmetric stuff like AES? Largely untouched. Bump to 256 if paranoid, sure. But 128? Solid.

Here’s the unique angle overlooked in the chatter: this myth echoes the Y2K cipher panics of the ’90s. Back then, DES (56-bit) faced real brute-force peril from rising compute. DES died, rightly so. AES-128? It’s the DES successor that learned the lesson—scaled for the long haul. Quantum doesn’t rewrite that math overnight.

Corporate PR spins quantum as total war on crypto. Not quite. Symmetric ciphers like AES dodge the worst. Don’t buy the full-replacement hype from vendors pushing proprietary post-quantum kits.

How Grover’s Algorithm Really Works (No Hype)

Grover’s searches unsorted databases quadratically faster. For AES keysearch: N=2^128 possibilities. Classical needs ~2^128 trials. Grover? ~2^64. Terrifying—until reality hits.

Quantum limits. Qubits error-prone. CRQC? Decades away, if ever. Even then, running Grover at scale demands millions of logical qubits. Parallelizing across machines? Forget it—the algorithm’s not embarrassingly parallel.

Bitcoin analogy crumbles. ASICs parallelize perfectly; each hashes independently. Grover’s oracle calls entangle states. You can’t distribute without exponential communication overhead.

Valsorda boils it down:

“a CRQC almost certainly couldn’t run like clusters of bitcoin ASICs and more importantly couldn’t parallelize the workload as the amateurs assume”

Precisely.

What This Means for Your Stack

Dev teams fretting AES-128 swaps? Stand down. TLS 1.3, disk encryption, VPNs—it’s embedded everywhere. Post-quantum priorities: asymmetric crypto first. AES-192/256 as belt-and-suspenders if regs demand.

Bold prediction: By 2035, we’ll have CRQCs demoing small Grover runs. AES-128 survives unscathed. The real shift? Hybrid schemes layering PQ publics over AES symmetrics. Architecture stays; keys evolve.

Skepticism pays. Quantum FUD sells consulting gigs. Valsorda’s reminder: stick to provable security margins.

Why Developers Should Care About AES-128 Post-Quantum

Implementation choices ripple. OpenSSL, libsodium—they’re prepped. But myths delay sane migrations, leaving weak asymmetrics exposed while ignoring symmetric strengths.

Unique insight: This parallels the SHA-1 saga. Lingered too long due to inertia; quantum myth risks same for AES perceptions. Act now on NIST finalists, not superstition.

**


🧬 Related Insights

Frequently Asked Questions**

Is AES-128 broken by quantum computers? No. Grover’s algorithm reduces search to 2^64 operations, but lacks practical parallelization, making attacks infeasible.

Should I switch from AES-128 to AES-256 now? Not urgently—AES-128 suffices. Use 256 for future-proofing if resources allow.

When will quantum computers break AES? Not soon. CRQCs are distant; even then, AES-128 holds for billions of years against brute-force.

Written by
Open Source Beat Editorial Team

Curated insights, explainers, and analysis from the editorial team.

Frequently asked questions

Is AES-128 broken by quantum computers?
No. Grover's algorithm reduces search to 2^64 operations, but lacks practical parallelization, making attacks infeasible.
Should I switch from AES-128 to AES-256 now?
Not urgently—AES-128 suffices. Use 256 for future-proofing if resources allow.
When will quantum computers break AES?
Not soon. CRQCs are distant; even then, AES-128 holds for billions of years against brute-force.

Worth sharing?

Get the best Open Source stories of the week in your inbox — no noise, no spam.

Originally reported by Ars Technica - Tech

Stay in the loop

The week's most important stories from Open Source Beat, delivered once a week.