this post was submitted on 26 Apr 2026
105 points (99.1% liked)

Technology

84274 readers
3325 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

AES-128 is safe against quantum computers. SHA-256 is safe against quantum computers. No symmetric key sizes have to change as part of the post-quantum transition. This is a near-consensus opinion amongst experts and standardization bodies and it needs to propagate to the rest of the IT community. The rest of this article backs up this claim both technically and with references to relevant authorities.

Original article: https://words.filippo.io/128-bits/

TL;DR: https://hackaday.com/2026/04/25/quantum-computers-are-not-a-threat-to-128-bit-symmetric-keys/

you are viewing a single comment's thread
view the rest of the comments
[–] tombo@nord.pub 16 points 5 days ago (1 children)
[–] partofthevoice@lemmy.zip 6 points 5 days ago (4 children)

Good for security. What does this mean for quantum computing, though? Does it mean that it’s not as powerful as we thought it would have been?

[–] GamingChairModel@lemmy.world 4 points 4 days ago (1 children)

Anybody who believed that quantum computing posed a risk to symmetric encryption was fundamentally misunderstanding how encryption works and what quantum computing might be good at one day.

Asymmetric cryptography is primarily used for the secure exchanging of symmetric keys: use a public/private key pair to exchange secure messages of what symmetric key to use for their session, and then both sides switch to the symmetric key for actual communication of a real payload.

A public/private key pair is two keys that have some interesting mathematical relationship, such that it is easy to confirm that someone possesses the right private key using the public key or to encrypt something that only the correct private key can decrypt. And that mathematical relationship, relating to the product of two very large prime numbers, is at the core of modern asymmetric cryptography.

Quantum computing may make number factorization much, much easier. So once a product of two large primes becomes possible to factor, the public/private key pairs might not be as secure anymore.

But none of this has anything to do with symmetric encryption, or hash functions. Quantum doesn't move the needle on that particular math.

The real risk, though, is for an adversary to eavesdrop on an encrypted key exchange (which uses asymmetric cryptography) and then the message itself (which uses symmetric cryptography) and then be able to take the two steps of getting the secret symmetric key from the intercepted key exchange over a compromised asymmetric protocol, and being able to decrypt the symmetric portion of the communication too.

[–] partofthevoice@lemmy.zip 1 points 4 days ago

Interesting, thanks for the insight. IIRC, you can leverage data about the quantum state to detect eavesdropping though — can’t you? So in effect, if I do recall correctly, it’s introducing a nuanced problem while also introducing a generally applicable solution to it?

[–] ranzispa@mander.xyz 5 points 5 days ago

Quantum computing has already been destroyed by AlphaFold.

I work in the computational chemistry field and I'd really love a working quantum computing solution to that kind of problems, but since the ML solutions came up most research in that direction stopped and it does not seem like there is any nearing solution in the world of quantum computing.

I'm not talking about qubits numbers or amount of errors themselves in the system but about the complete lack of algorithms that can handle the problem. Most of what I've seen is handling childlike problems that a single core CPU will do better and quicker anyway. It really does not feel like all the promises that have been done are anywhere near to coming true.

When I speak with people working in the field they're like: sure in a few years if we can get better computers we'll be able to handle a few hundred atoms at a time (all without any actual working methodology and assuming that will be developed), however we are more commonly talking about hundreds of thousands of atoms... There's little hope on my part that anything useful will come out of there soon. However, I do really hope it does: quantum computing would be a huge revolution for chemistry if it works as advertised.

[–] tombo@nord.pub 2 points 5 days ago

I think it means that there was probably some misunderstandings of how a qbit would do calculations or execute code.

[–] db2@lemmy.world 1 points 5 days ago (1 children)

As expected the same dipshits pushing AI also lied about what quantum computing even is.

I'm imagining if I had said this even a month ago even though it's what I've thought for years.

[–] ranzispa@mander.xyz 3 points 5 days ago (1 children)

It's most likely not the same people, as AI destroyed quantum computing. A person strongly invested into quantum computing would be crazy to push for AI.

[–] db2@lemmy.world 2 points 5 days ago* (last edited 5 days ago)