On Monday, Valsorda lastly channeled years’ price of frustration, fueled by the extensively held misunderstanding, right into a blog post titled “Quantum Computer systems Are Not a Menace to 128-bit Symmetric Keys.”
“There’s a standard false impression that quantum computer systems will ‘halve’ the safety of symmetric keys, requiring 256-bit keys for 128 bits of safety,” he wrote. “That isn’t an correct interpretation of the speedup provided by quantum algorithms, it’s not mirrored in any compliance mandate, and dangers diverting vitality and a spotlight from really vital post-quantum transition work.”
That’s the simple a part of the argument. The a lot tougher half is the mathematics and physics that specify it. At its highest stage, it comes right down to a elementary distinction in the way in which a brute-force search works on classical computer systems versus the way in which it really works utilizing Grover’s algorithm. Classical computer systems can carry out a number of searches concurrently, a functionality that enables giant duties to be damaged into smaller items to finish the general job quicker. Grover’s algorithm, in contrast, requires a long-running serial computation, the place every search is finished one after the other.
“What makes Grover particular is that as you parallelize it, its benefit over non-quantum algorithms will get smaller,” Valsorda stated in an interview. He continued:
Think about it with small numbers, let’s say there are 256 doable mixtures to a lock, A traditional assault would take 256 tries. You determine it’s too lengthy, so that you get three buddies and also you every do 64 tries. “That’s the classical parallelization. With Grover you might in principle do √256)=16 tries in a row, but when that’s nonetheless too lengthy and also you once more search for assist from three buddies. Every has to do √256/4)=8 tries.
So in complete you do 8*4=32 tries, which is greater than the 16 you’ll have performed alone! Asking for assist to parallelize the assault made the assault slower general. Which isn’t the case for classical assaults.
In fact the numbers are means bigger, but when we apply any affordable constraint on the attacker (like having to complete a run in 10 years), the full work turns into a lot greater than 264.
Additionally, 264 was by no means the appropriate quantity, as a result of that pretends you are able to do AES as a single operation on a single qubit. That is considerably orthogonal. The mixture of those two observations flip the precise price into 2104 give or take, which is properly past the edge for safety.
Sophie Schmieg, a senior cryptography engineer at Google, defined it this manner:

