Skip to content

Quantum Computing News

  • Home
  • Quantum News
    • Quantum Computing
    • Quantum Hardware and Software
    • Quantum Startups and Funding
    • Quantum Computing Stocks
    • Quantum Research and Security
  • IMP Links
    • About Us
    • Contact Us
    • Privacy & Policies
  1. Home
  2. Quantum Computing
  3. Fillippo Valsorda Corrects A Quantum Computer AES-128 Myth
Quantum Computing

Fillippo Valsorda Corrects A Quantum Computer AES-128 Myth

Posted on April 22, 2026 by agarapuramesh5 min read
Fillippo Valsorda Corrects A Quantum Computer AES-128 Myth

The Quantum Myth: Why AES-128 Remains Secure in a Post-Quantum World

Fillippo Valsorda

A persistent “popular mythology” has emerged in the present cybersecurity scene, claiming that the introduction of cryptographically relevant quantum computers (CRQCs) will immediately make 128-bit symmetric encryption obsolete. According to cryptography engineer Filippo Valsorda, this “stubborn misconception” is a dangerous diversion that is “hampering the already hard work of quantum readiness” rather than just a technical mistake. Expert agreement, spearheaded by Valsorda and backed by institutions like NIST, is unambiguous as corporations rush to get ready for a post-quantum future: AES-128 is just fine.

You can also read Quantum eMotion QeM Achieves NYSE Trading Milestone

The “Halving” Fallacy

Amateur mathematicians and cryptographers have been spreading the myth that quantum computers will “halve” the effective security of symmetric keys for more than ten years. Grover’s algorithm, a quantum technique that can search an unsorted database more quickly than a classical computer, is misconception.

It is widely believed that Grover’s technique decreases AES-128’s security to just 264 bits. To put this into perspective, given all of the world’s bitcoin mining resources as of 2026, it would take about 9 billion years to break a 2128 key classically. That identical key may be brute-forced by a CRQC in less than a second, according to the myth. According to Valsorda, this interpretation is essentially incorrect since it ignores the mathematical and physical reality of how quantum algorithms really scale.

You can also read DARPA Contracts Awards Infleqtion for Heterogeneous Quantum

The Parallelization Paradox

The idea of parallelization forms the basis of the case for AES-128’s robustness. If an attack is too slow in classical computing, you can just increase. For instance, you can employ three friends, divide the search space into four sections, and complete the task four times quicker if a search takes too long for one computer.

This is not how Grover’s algorithm operates. It is a serial computation that takes a lengthy time. As Valsorda explains, “What makes Grover special is that as you parallelize it, its advantage over non-quantum algorithms gets smaller”.

Valsorda demonstrates the inefficiency of quantum parallelization using a simplified lock-picking analogy:

  • Classical: You and three buddies must attempt 64 different combinations to open a 256-combination lock. The division of labor is effective.
  • Quantum: In principle, a quantum computer could find the key in √256 = 16 attempts. However, each of your three friends four quantum computers must try √256/4 = 8.
  • The Result: As a result, the group completes 8×4=32 attempts, which is twice as much work as a single quantum computer working alone.

In practical terms, this means that although a quantum computer could theoretically speed up an attack, requesting assistance actually slows it down. The real cost to crack AES-128 is still around 2104, which is well over any realistic barrier for a successful breach, even when sensible restrictions are put in place, such as requiring an attack to be completed within a 10-year window.

You can also read Viewbix ltd Rebrands as Quantum X Labs to Quantum Future

The Reality of “Core-Seconds”

Sophie Schmieg, a senior cryptography engineer at Google, examines “core-seconds” to give this protection more technical depth. An attacker has a 50% chance of success if they pause midway through a traditional brute-force search. You just need two computers to decrease the time in half.

In comparison, there is only a 25% chance of success if a Grover’s search is stopped midway. An attacker would require four computers rather than two to partition the search space and retain a high likelihood of success. An attacker would require 2128 quantum computers in the “maximally parallel instance” at the extreme end of this scale, where each quantum computer examines just one key, making the attack no more effective than a classical one.

Compliance and Global Standards

Major scientific and regulatory organizations have not required a switch from AES-128 for quantum ready, despite the widespread misconception. Valsorda cites a “litany of sources” that back the standard’s ongoing application, such as:

  • NIST stands for the National Institute of Standards and Technology.
  • Federal Office for Information Security in Germany.
  • Scholars such as University of Waterloo professor Samuel Jaques.

The NSA’s Commercial National Security Algorithm Suite (Version 2), which requires AES-256, is the only significant exemption. Valsorda points out that this prerequisite existed long before the current drive toward quantum ready. Rather than being a particular response to Grover’s method, the NSA’s choice for AES-256 seems to be a move toward uniformity, choosing one “oversized primitive” for all settings to avoid fractured security levels.

AES-256 is still necessary in some situations, such as preventing “collisions” in which two keys happen to be equivalent at random because of the birthday paradox. However, 128-bit keys continue to be a reliable “sweet spot” between security and computational efficiency for the great majority of applications.

You can also read Aeluma receives NASA award for integrated Quantum Dot Lasers

Focus on the Real Threat: Shor’s Algorithm

The risk of becoming fixated on symmetric encryption, such as AES, is that it takes focus away from the real existential threat that quantum computing poses: Shor’s algorithm. Asymmetric (public-key) algorithms can be broken in “polynomial time” using Shor’s algorithm, in contrast to Grover’s, which provides a reasonable square-root acceleration.

Public-key encryption, which protects everything from digital signatures to online browsing, is very weak. It is a “tall enough order” to transition these systems without having to deal with the “needless churn” that comes with swapping out perfectly operating symmetric systems.

The cybersecurity community should consider AES-128’s ongoing resiliency a “blessing,” according to Valsorda. Engineers can concentrate their limited resources on the critical changes needed to survive the quantum era by ignoring symmetric systems.

You can also read SEALSQ News: Advancing PQC In Silicon For AI Resilience

Tags

128 AES EncryptionAES 128 encryption algorithmAES 128 quantumAES-128 encryptionCRQCsCryptographically Relevant Quantum ComputersGrover's algorithmQuantum algorithmsQuantum computingShor’s Algorithm

Written by

agarapuramesh

Post navigation

Previous: Pasqal Thoughts 2026: Quantum Computing Enters Real-World
Next: PINQ² Exclusive Canadian Distributor for Pasqal Quantum

Keep reading

QbitSoft

Scaleway & QbitSoft Launch European Quantum Adoption Program

4 min read
USC Quantum Computing

USC Quantum Computing Advances National Security Research

5 min read
SuperQ Quantum Computing Inc. at Toronto Tech Week 2026

SuperQ Quantum Computing Inc. at Toronto Tech Week 2026

4 min read

Leave a Reply Cancel reply

You must be logged in to post a comment.

Categories

  • Scaleway & QbitSoft Launch European Quantum Adoption Program Scaleway & QbitSoft Launch European Quantum Adoption Program May 23, 2026
  • USC Quantum Computing Advances National Security Research USC Quantum Computing Advances National Security Research May 23, 2026
  • SuperQ Quantum Computing Inc. at Toronto Tech Week 2026 SuperQ Quantum Computing Inc. at Toronto Tech Week 2026 May 23, 2026
  • WISER and Fraunhofer ITWM Showcase QML Applications WISER and Fraunhofer ITWM Showcase QML Applications May 22, 2026
  • Quantum X Labs Integrates Google Data for Error Correction Quantum X Labs Integrates Google Data for Error Correction May 22, 2026
  • SEALSQ and IC’Alps Expand Post-Quantum Security Technologies SEALSQ and IC’Alps Expand Post-Quantum Security Technologies May 21, 2026
  • MTSU Events: Quantum Valley Initiative Launches with MTE MTSU Events: Quantum Valley Initiative Launches with MTE May 20, 2026
  • How Cloud Quantum Computers Could Become More Trustworthy How Cloud Quantum Computers Could Become More Trustworthy May 20, 2026
  • Quantinuum Expands Quantum Leadership with Synopsys Quantum Quantinuum Expands Quantum Leadership with Synopsys Quantum May 20, 2026
View all
  • QeM Inc Reaches Milestone with Q1 2026 Financial Results QeM Inc Reaches Milestone with Q1 2026 Financial Results May 23, 2026
  • Arqit Quantum Stock News: 2026 First Half Financial Results Arqit Quantum Stock News: 2026 First Half Financial Results May 22, 2026
  • Sygaldry Technologies Raises $139M to Quantum AI Systems Sygaldry Technologies Raises $139M to Quantum AI Systems May 18, 2026
  • NSF Launches $1.5B X-Labs to Drive Future Technologies NSF Launches $1.5B X-Labs to Drive Future Technologies May 16, 2026
  • IQM and Real Asset Acquisition Corp. Plan $1.8B SPAC Deal IQM and Real Asset Acquisition Corp. Plan $1.8B SPAC Deal May 16, 2026
  • Infleqtion Q1 Financial Results and Quantum Growth Outlook Infleqtion Q1 Financial Results and Quantum Growth Outlook May 15, 2026
  • Xanadu First Quarter Financial Results & Business Milestones Xanadu First Quarter Financial Results & Business Milestones May 15, 2026
  • Santander Launches The Quantum AI Leap Innovation Challenge Santander Launches The Quantum AI Leap Innovation Challenge May 15, 2026
  • CSUSM Launches Quantum STEM Education With National Funding CSUSM Launches Quantum STEM Education With National Funding May 14, 2026
View all
  • QTREX AME Technology May Alter Quantum Hardware Connectivity QTREX AME Technology May Alter Quantum Hardware Connectivity May 23, 2026
  • Quantum Spain: The Operational Era of MareNostrum-ONA Quantum Spain: The Operational Era of MareNostrum-ONA May 23, 2026
  • NVision Inc Announces PIQC for Practical Quantum Computing NVision Inc Announces PIQC for Practical Quantum Computing May 22, 2026
  • Xanadu QROM Innovation Ends Seven-Year Quantum Memory Stall Xanadu QROM Innovation Ends Seven-Year Quantum Memory Stall May 22, 2026
  • GlobalFoundries Quantum Computing Rise Drives U.S. Research GlobalFoundries Quantum Computing Rise Drives U.S. Research May 22, 2026
  • BlueQubit Platform Expands Access to Quantum AI Tools BlueQubit Platform Expands Access to Quantum AI Tools May 22, 2026
  • Oracle and Classiq Introduce Quantum AI Agents for OCI Oracle and Classiq Introduce Quantum AI Agents for OCI May 21, 2026
  • Kipu Quantum: Classical Surrogates for Quantum-Enhanced AI Kipu Quantum: Classical Surrogates for Quantum-Enhanced AI May 21, 2026
  • Picosecond low-Power Antiferromagnetic Quantum Switch Picosecond low-Power Antiferromagnetic Quantum Switch May 21, 2026
View all
  • Terra Quantum Quantum-Secure Platform for U.S. Air Force Terra Quantum Quantum-Secure Platform for U.S. Air Force May 23, 2026
  • Merqury Cybersecurity and Terra Quantum’s Secured Data Link Merqury Cybersecurity and Terra Quantum’s Secured Data Link May 23, 2026
  • ESL Shipping Ltd & QMill Companys Fleet Optimization project ESL Shipping Ltd & QMill Companys Fleet Optimization project May 23, 2026
  • Pasqals Logical Qubits Beat Physical Qubits on Real Hardware Pasqals Logical Qubits Beat Physical Qubits on Real Hardware May 22, 2026
  • Rail Vision Limited Adds Google Dataset to QEC Transformer Rail Vision Limited Adds Google Dataset to QEC Transformer May 22, 2026
  • Infleqtion Advances Neutral-Atom Quantum Computing Infleqtion Advances Neutral-Atom Quantum Computing May 21, 2026
  • Quantinuum News in bp Collaboration Targets Seismic Image Quantinuum News in bp Collaboration Targets Seismic Image May 21, 2026
  • ParityQC Achieves 52-Qubit Quantum Fourier Transform on IBM ParityQC Achieves 52-Qubit Quantum Fourier Transform on IBM May 21, 2026
  • PacketLight And Quantum XChange Inc Optical Network Security PacketLight And Quantum XChange Inc Optical Network Security May 21, 2026
View all
  • Quantum Computing Funding: $2B Federal Investment in U.S Quantum Computing Funding: $2B Federal Investment in U.S May 22, 2026
  • Quantum Bridge Technologies Funds $8M For Quantum Security Quantum Bridge Technologies Funds $8M For Quantum Security May 21, 2026
  • Nord Quantique Inc Raises $30M in Quantum Computing Funding Nord Quantique Inc Raises $30M in Quantum Computing Funding May 20, 2026
  • ScaLab: Advances Quantum Computing At Clemson University ScaLab: Advances Quantum Computing At Clemson University May 19, 2026
  • National Quantum Mission India Advances Quantum Innovation National Quantum Mission India Advances Quantum Innovation May 18, 2026
  • Amaravati Leads Quantum Computing in Andhra Pradesh Amaravati Leads Quantum Computing in Andhra Pradesh May 18, 2026
  • Wisconsin Technology Council Spotlights Quantum Industries Wisconsin Technology Council Spotlights Quantum Industries May 18, 2026
View all

Search

Latest Posts

  • Scaleway & QbitSoft Launch European Quantum Adoption Program May 23, 2026
  • Terra Quantum Quantum-Secure Platform for U.S. Air Force May 23, 2026
  • Merqury Cybersecurity and Terra Quantum’s Secured Data Link May 23, 2026
  • USC Quantum Computing Advances National Security Research May 23, 2026
  • QTREX AME Technology May Alter Quantum Hardware Connectivity May 23, 2026

Tutorials

  • Quantum Computing
  • IoT
  • Machine Learning
  • PostgreSql
  • BlockChain
  • Kubernettes

Calculators

  • AI-Tools
  • IP Tools
  • Domain Tools
  • SEO Tools
  • Developer Tools
  • Image & File Tools

Imp Links

  • Free Online Compilers
  • Code Minifier
  • Maths2HTML
  • Online Exams
  • Youtube Trend
  • Processor News
© 2026 Quantum Computing News. All rights reserved.
Back to top