Skip to content
Research · Apr 21, 2026

AES-128 remains secure against quantum computing threats, contrary to widespread belief

A cryptography engineer at Google clarifies that Grover's algorithm does not reduce AES-128 security by half as commonly claimed, directing post-quantum transition efforts toward asymmetric encryption instead.

Trust62
HypeLow hype

1 source · cross-referenced

ShareXLinkedInEmail
TL;DR
  • Filippo Valsorda published analysis arguing AES-128 provides adequate security even in a post-quantum computing environment, challenging the misconception that Grover's algorithm halves symmetric key strength
  • The security reduction from Grover's algorithm is constrained by parallelization limits, resulting in an effective cost around 2^104 rather than the popularly cited 2^64
  • NIST, German Federal Office for Information Security, and University of Waterloo researchers have endorsed AES-128 for post-quantum security, with NSA's 256-bit requirement being unrelated to quantum threats
  • The focus on unnecessarily upgrading symmetric encryption diverts resources from critical work on post-quantum asymmetric algorithms vulnerable to Shor's algorithm

A widespread misconception about quantum computing's impact on cryptography is hampering preparation for the post-quantum era. The prevailing belief holds that quantum computers running Grover's algorithm would effectively halve the security strength of AES-128, reducing its 2^128 key space to a computationally manageable 2^64. Cryptography engineer Filippo Valsorda at Google has published detailed analysis arguing this interpretation misunderstands the fundamental mechanics of quantum parallelization.

The mathematical crux involves how Grover's algorithm scales differently than classical brute-force attacks when distributed across multiple processors. Classical attacks allow parallel computation where tasks are divided evenly—doubling computational resources halves the time needed. Grover's algorithm, however, requires sequential computation where parallelization introduces diminishing returns. Adding more quantum computers to a Grover search actually increases the total computational work required, eventually approaching the same 2^128 complexity of classical brute force if maximally distributed.

Under realistic operational constraints—such as completing an attack within ten years—the effective security cost of AES-128 against a quantum adversary approaches 2^104, well above the 2^80 threshold conventionally considered secure. This analysis aligns with guidance from the National Institute of Standards and Technology, Germany's Federal Office for Information Security, and academic researchers including Samuel Jaques at the University of Waterloo.

The NSA's mandate for AES-256 in its Commercial National Security Algorithm Suite predates quantum computing concerns and reflects a policy choice to use oversized primitives for standardization consistency rather than quantum-specific requirements. Valsorda argues that conflating unnecessary cryptographic upgrades with essential post-quantum work misdirects engineering effort from the genuine priority: replacing asymmetric encryption schemes vulnerable to Shor's algorithm, which offers exponential speedups unsuitable for any modern key size.

Sources
  1. 01Ars Technica — Technology LabContrary to popular superstition, AES 128 is just fine in a post-quantum world
Also on Research

Stories may contain errors. Dispatch is assembled with AI assistance and curated by human editors; despite the trust-score filter, mistakes happen. We correct publicly — every article links to its revision history. Nothing here is financial, legal, or medical advice. Verify before relying on any claim.

© 2026 Dispatch. No ads. No sponsorships. No paid placement. Reader-supported via Ko-fi.

Built by a person who cares about honest AI news.