AES-128 Encryption Remains Secure in Quantum Era

Cryptography expert debunks quantum computing myths about AES-128 encryption security. Learn why this widely-used cipher standard is still safe for post-quantum systems.
As quantum computing continues to advance and capture headlines about potential threats to modern encryption, leading cryptography engineer Filippo Valsorda is stepping forward to challenge a persistent misconception that has taken hold in security circles. Despite widespread concerns about how quantum computers might compromise encryption systems, Valsorda emphasizes that AES-128 encryption remains fundamentally secure and reliable even in a future dominated by quantum computing technologies. This clarification comes as crucial for organizations worldwide that depend on this cipher for protecting sensitive data across countless applications.
The Advanced Encryption Standard (AES) represents one of the most significant achievements in modern cryptography, having been formally adopted by the National Institute of Standards and Technology (NIST) in 2001 following an intensive selection process. Among its three key variants—128-bit, 192-bit, and 256-bit—the 128-bit version has become the industry standard, achieving near-universal adoption across government, financial, healthcare, and commercial sectors. This widespread implementation reflects decades of rigorous analysis and real-world deployment that has consistently demonstrated the algorithm's reliability and strength against conventional cryptographic attacks.
The appeal of AES-128 lies in its optimal balance between computational efficiency and robust security properties. Organizations benefit from its relatively low processing overhead while maintaining exceptional protection levels that have withstood three decades of intensive scrutiny without any practical vulnerabilities being discovered. The security foundation of AES-128 rests on the fact that breaking it through brute-force attack—the only known approach—would require attempting 2128 possible key combinations, which equals approximately 3.4 x 1038 possibilities. Even when mobilizing the entire Bitcoin mining network's computational resources as currently deployed in 2026, such an attack would theoretically require approximately 9 billion years to succeed.
Source: Ars Technica


