The myth that won’t die: Why everyone thinks AES-128 is quantum-vulnerable
A persistent piece of cryptographic folk wisdom holds that quantum computers will slash effective key lengths in half, reducing AES-128’s 128-bit security to a mere 64 bits — a level that would be catastrophically weak by any modern standard. This belief has migrated out of academic speculation and into real engineering decisions, compliance checklists, and vendor marketing materials, where “AES-256 for quantum safety” has become a reflexive recommendation repeated often enough to sound authoritative.
The claim traces back to Grover’s algorithm, a quantum search technique that theoretically reduces the number of operations needed to brute-force a symmetric key from 2^n to 2^(n/2). On paper, the math looks alarming: AES-128 drops from 2^128 possible keys to a search space of 2^64, which classical computers can handle in practical timeframes. Vendors and compliance frameworks latched onto this framing, and the “128 is the new 64” talking point spread accordingly.
Cryptography engineer Filippo Valsorda has pushed back directly on this mythology, arguing it fundamentally misrepresents how Grover’s algorithm operates in the real world. AES-128 has no known vulnerabilities after 30 years of cryptanalysis, meaning brute force remains the only viable attack. A classical brute-force attack against AES-128 requires working through 3.4 undecillion possible keys — a number so large it comfortably exceeds any realistic attack budget. The Grover’s algorithm scenario assumes a fault-tolerant quantum computer running the algorithm at scale with negligible overhead, a machine that does not exist and faces severe physical constraints even in theoretical designs.
The 64-bit figure is also misleading because 64-bit security is not automatically broken — it describes a hard computational problem that requires massive parallelism and resources even for classical systems. A quantum computer applying Grover’s algorithm to AES-128 would need to execute roughly 2^64 sequential quantum operations, each dependent on the last, with no meaningful parallelization benefit. The real-world cost and time required make the attack impractical by any engineering measure.
The myth persists because it contains enough surface-level technical plausibility to pass casual scrutiny. Halving key strength sounds like a clean, quotable rule. It is not.
What Grover’s algorithm actually does — and what it doesn’t
Grover’s algorithm is the quantum attack most commonly cited against AES-128, and the math behind it sounds alarming on the surface. A quantum computer running Grover’s algorithm can search an unsorted dataset quadratically faster than any classical machine, which means the effective security of a 128-bit key drops to 2^64 operations. Security teams read that number, panic, and order an upgrade to AES-256. The problem is that 2^64 quantum operations is not the same thing as 2^64 classical operations, and the difference matters enormously.
Grover’s algorithm is serial, not parallel. Each iteration of the search depends on the result of the previous one, so you cannot simply throw more quantum processors at the problem and watch the timeline compress. Running the algorithm at the scale required to threaten AES-128 demands a fault-tolerant, large-scale quantum computer capable of sustaining coherence across millions of logical qubits for an extended period. No such machine exists, and the engineering challenges involved are not incremental — they are foundational.
Cryptography engineer Filippo Valsorda has made this point directly: AES-128 has no known vulnerabilities after 30 years, and brute force remains the only viable attack path. A classical brute-force attempt against AES-128 must work through 2^128 possible keys — roughly 340 undecillion combinations. Grover’s algorithm cuts that search space to 2^64 in quantum operations, but each of those operations carries significant overhead in time, error correction, and physical qubit requirements. When researchers account for the actual cost of fault-tolerant quantum computation at that scale, the real-world time required to crack AES-128 stays astronomical.
The simplified “halvening” narrative — the idea that quantum computing neatly halves bit security, so 128-bit becomes 64-bit and therefore broken — strips out every practical constraint. It treats theoretical algorithmic complexity as a deployment-ready capability. It is not. The gap between Grover’s algorithm as a mathematical result and Grover’s algorithm as an operational attack tool is measured in decades of engineering progress that has not yet happened.
AES-128 vs AES-256: The actual security tradeoff most articles skip
NIST formally adopted the Advanced Encryption Standard in 2001 with three key-length options: 128, 192, and 256 bits. Despite having three choices, the industry settled on AES-128 as the dominant deployment standard. It hits the right balance between computational overhead and security, runs faster on constrained hardware, and consumes less energy at scale — none of which is a trivial consideration when you’re encrypting billions of transactions daily.
The security gap between AES-128 and AES-256 sounds dramatic on paper. In practice, it is meaningless. AES-128 has no known structural vulnerabilities after roughly 30 years of cryptanalysis. The only viable attack is brute force, which requires working through 2¹²⁸ possible keys — approximately 340 undecillion combinations. No classical computer alive or projected can touch that. AES-256 doubles the key length, but it doesn’t double security against a realistic threat model. It addresses a margin of risk that does not exist in the classical computing world.
The quantum argument is where the upgrade narrative gets inflated. Grover’s algorithm, the quantum attack most relevant to symmetric encryption, does reduce the effective security of AES-128 — but only by half, dropping it to a 64-bit equivalent in the quantum threat model. That sounds alarming until you factor in the physical reality: executing Grover’s algorithm against AES-128 at scale would require a fault-tolerant quantum computer running millions of logical qubits in sustained coherence. Current quantum hardware operates in the hundreds of noisy physical qubits. Cryptography engineer Filippo Valsorda has made this point directly: AES-128 is perfectly adequate in a post-quantum world given the hardware gap between theoretical quantum attacks and any machine that actually exists or is near-term buildable.
Upgrading to AES-256 carries tangible costs. Encryption and decryption run slower. Energy consumption increases. Key management grows more complex, particularly in distributed systems where keys are rotated frequently. Organizations absorb those costs in exchange for protection against a quantum brute-force attack that current physics cannot execute. That is the tradeoff most upgrade recommendations skip entirely — the threat is theoretical, the performance penalty is real, and the security gain against any actual adversary is zero.
Where the genuine quantum threat actually lives
Shor’s algorithm is the real quantum menace, and it targets a completely different class of cryptography. Developed by mathematician Peter Shor in 1994, the algorithm can efficiently solve the integer factorization problem and the discrete logarithm problem — the two mathematical foundations that RSA and elliptic curve cryptography (ECC) are built on. A sufficiently powerful quantum computer running Shor’s algorithm doesn’t halve the effective key strength of RSA-2048; it obliterates it entirely. The protection evaporates.
This is the threat landscape that demands urgent action. RSA and ECC underpin virtually every trust mechanism in modern public-key infrastructure: TLS certificates that authenticate websites, the key exchange protocols inside HTTPS connections, code-signing certificates, SSH authentication, and the digital signatures that verify software updates. All of it relies on mathematical problems that quantum computers can solve in polynomial time.
NIST recognized this and spent six years running a formal post-quantum cryptography standardization process. In 2024, it published the first finalized post-quantum cryptographic standards — including ML-KEM (based on the CRYSTALS-Kyber algorithm) for key encapsulation and ML-DSA (based on CRYSTALS-Dilithium) for digital signatures. These are structured around lattice-based mathematics, which has no known quantum speedup equivalent to Shor’s algorithm. That is where the migration energy belongs.
The practical danger is compounded by “harvest now, decrypt later” attacks. Nation-state adversaries are already collecting encrypted internet traffic today, storing it, and waiting for quantum hardware to mature before decrypting it. Any data with a confidentiality requirement extending more than a decade — government communications, medical records, financial contracts — is already at risk under this model. The clock on public-key infrastructure started running years ago.
Organizations that spend 2025 auditing whether their AES key length is 128 or 256 bits are looking at the wrong wall entirely. Their X.509 certificate chains, their TLS handshake key exchange mechanisms, their VPN authentication protocols — those are the systems with an expiration date that Shor’s algorithm will enforce.
The missing context: How cryptographic myths spread and why they stick
Cryptographic myths spread the way all bad information spreads: the simple version travels fast, and the correction arrives late. “Quantum computers halve your key length” is a clean, memorable rule. Security trainers put it in slide decks. Compliance frameworks absorb it. Vendor documentation repeats it. By the time a cryptographer like Filippo Valsorda steps in to call it mythology, the rule has already been cited in hundreds of procurement decisions and internal security policies.
The rule isn’t entirely fabricated — it traces back to Grover’s algorithm, a real quantum technique that does reduce the effective search space for symmetric keys. But the shorthand strips out everything that makes the nuance matter: the physical qubit requirements for attacking AES-128 at scale, the error-correction overhead, the gap between a theoretical speedup and an operationally feasible attack. What survives in practice is a single anxious takeaway — upgrade to AES-256 — detached from any of the reasoning that would let someone evaluate it.
Vendor incentives sharpen the problem. Hardware manufacturers selling AES-256 capable chips and security vendors marketing “quantum-safe” symmetric encryption products have a direct financial interest in practitioners believing AES-128 is compromised. Overstating the threat costs vendors nothing and sells product. The result is a market where fear does the technical work that evidence hasn’t.
This is the gap Valsorda’s intervention exposes. Cryptographers operate with access to the actual research — the qubit counts, the algorithmic constraints, the honest projections about quantum timelines. Developers, buyers, and compliance officers operate with whatever filtered version of that research reached them through a blog post, a vendor brief, or a training module written by someone who also only had the filtered version. The correction rarely travels as fast as the original claim, and in security, that lag has a cost. Organizations redirect engineering effort, budget, and risk prioritization based on a threat that experts don’t recognize in the form it’s being sold to them.
What engineers and decision-makers should actually do right now
Migrate your key exchange and digital signature infrastructure first. RSA and ECC are the actual quantum casualties — Shor’s algorithm breaks both, and adversaries are already running “harvest now, decrypt later” operations against intercepted ciphertext. NIST finalized its first post-quantum cryptography standards in 2024, including ML-KEM (formerly KYBER) for key encapsulation and ML-DSA (formerly DILITHIUM) for digital signatures. Start there. Audit every system that uses RSA or ECC for authentication, key agreement, or certificate signing, and build a migration roadmap with real deadlines attached to it.
Leave your AES-128 deployments alone. Grover’s algorithm, the quantum attack relevant to symmetric encryption, reduces AES-128’s effective security from 128 bits to 64 bits in theory — but executing Grover’s at any meaningful scale requires a fault-tolerant quantum computer that does not exist and will not exist on any credible near-term timeline. Cryptography engineer Filippo Valsorda has made this point explicitly: AES-128 is fine in a post-quantum world. The engineering hours required to rip and replace AES-128 across production systems are hours not spent replacing RSA in your TLS handshakes or your code-signing pipeline. That trade-off has one obvious correct answer.
Apply a simple filter to every vendor or compliance claim you evaluate: does this “quantum-safe” product or requirement focus on symmetric key length, or does it address asymmetric algorithm replacement? If a vendor is leading with AES-256 upgrades as the centerpiece of a quantum-readiness pitch, they are selling you security theater. If a compliance framework mandates AES-256 without mandating a transition away from RSA and ECC, push back and demand a technical justification. None exists.
The practical checklist is short: inventory your asymmetric cryptography, prioritize systems where long-lived data confidentiality or authentication integrity is at stake, adopt ML-KEM and ML-DSA on the timelines NIST has laid out, and stop burning resources on symmetric key length inflation. Quantum risk is real and specific. Treat it that way.