Quantum Computers Are Not a Threat to 128-Bit Symmetric Keys
7 hours ago
- #cryptography
- #post-quantum-security
- #quantum-computing
- Quantum computers threaten asymmetric cryptography (ECDH, RSA, etc.) via Shor's algorithm, but not symmetric algorithms like AES and SHA.
- Misconception: Grover's algorithm halves symmetric key security, requiring 256-bit keys. In reality, Grover's parallelization limitations make AES-128 safe.
- Grover's algorithm requires sequential execution; parallelizing reduces its quadratic speedup, making attacks on 128-bit keys impractical (e.g., needing 140 trillion quantum circuits for 10 years).
- NIST confirms AES-128 is safe post-quantum, using it as a benchmark (Category 1), and standards like BSI also endorse AES-128 without key size changes.
- Switching to 256-bit symmetric keys is unnecessary and diverts resources from urgent post-quantum transitions; well-designed protocols like TLS already ensure 128-bit security.