Bbs.itsportsbetDocsTechnology
Related
Making Accessibility Stick: A Designer's Step-by-Step Guide to Recognizing Inclusive Design IssuesRemarkable Paper Pure: A New Black-and-White E Ink Tablet Without Color or Front LightKubernetes v1.36 'Haru' Delivers 70 Enhancements Across Stable, Beta, and AlphaHow to Install the watchOS 26.5, tvOS 26.5, and visionOS 26.5 Release Candidate BetasHow to Use In-Place Pod-Level Vertical Scaling in Kubernetes v1.36Cruise Safety: How to Identify and Respond to Hantavirus Risks at SeaiOS 27 Overhaul: Siri App, Satellite 5G, and Bug Fix Focus Revealed in Leaked FeaturesDesign Gap Exposed: Why Most Products Work but Few Excel in Daily Use

A Look at Contrary to popular superstition, AES 128 is just fine in a post-qu...

Last updated: 2026-04-30 18:41:09 · Technology

With 2128 or 3.4 x 1038 possible key combinations, such an attack would take about 9 billion years using the entire bitcoin mining resources as of 2026. With growing focus on the existential threat quantum computing poses to some of the most crucial and widely used forms of encryption, cryptography engineer Filippo Valsorda wants to make one thing absolutely clear: Contrary to popular mythology that refuses to die, AES 128 is perfectly fine in a post-quantum world. AES 128 is the most widely used variety of the Advanced Encryption Standard, a block cipher suite formally adopted by NIST in 2001. While the specification allows 192- and 256-bit key sizes, AES 128 was widely considered to be the preferred one because it meets the sweet spot between computational resources required to use it and the security it offers. With no known vulnerabilities in its 30-year history, a brute-force attack is the only known way to break it.

It boils down to parallelization

They said a CRQC would halve the effective strength to just 264, a small enough supply that—if true—would allow the same bitcoin mining resources to brute force it in less than a second (the comparison is purely for illustration purposes; a CRQC almost certainly couldn’t run like clusters of bitcoin ASICs and more importantly couldn’t parallelize the workload as the amateurs assume).Read full article Comments Over the past decade, something interesting happened to all that public confidence. Amateur cryptographers and mathematicians twisted a series of equations known as Grover’s algorithm to declare the death of AES 128 once a cryptographically relevant quantum computer (CRQC) came into being.

A Look at
Photo
A Look at
Photo