The Problem: AES Encryption is Vulnerable to Quantum Computers
AES encryption protects your privacy, medical and bank information, personal emails, and so much more.
It’s been considered the gold standard in digital security for decades, but now — Quantum Computers have made it obsolete.
We have quantum computers today that can crack AES encryption in seconds, no matter how strong the key.
It’s not a matter of if it will happen — it’s happening now.
This means that a quantum computer can crack AES encryption almost instantly by testing every possible key in parallel — and finding the correct one much faster than any classical computer could.
It takes classic computers a very long time to brute-force AES because the number of distinct key combinations is very large.
To appreciate how large take a look at this table:
Key | Comb | Decimal Combinations |
---|---|---|
128 bit | 2128 | 340,282,366,920,938,463,463 ,374,607,431,768,211,456 |
192 bit | 2192 | 6,277,101,735,386,680,763,835 ,789,423,207,666,416,102 ,355,444,464,034,512,896 |
256 bit | 2256 | 115,792,089,237,316,195,423 ,570,985,008,687,907,853 ,269,984,665,640,564,039 ,457,584,007,913,129,639,936 |
These are very large numbers, and in order for a classic computers to process each combination it must 'count' through each one like an odometer.
AES relies for its security on the fact that classic computers take a long time to test each possible combination.
It relies on 'Encryption Decryption Asymmetry', a cryptographic term that means 'fast to encrypt and slow to brute-force decrypt'.
AES also relies on quality keys for its security. While the number of possible combinations is very large, you may be able to 'guess' a combination from password lists and other techniques.
AES reliance on contemporary computer speed and architecture for its security means that it has always been vulnerable.
The remarkable capability of Quantum Computers to process data simultaneously threatens AES.
Let's compare classic bits with quantum computer qubits:
This is the shocking reality of the quantum encryption threat.
The Flatow Algorithms turn quantum computers into AES decryption machines without needing perfect qubits or years of development.
Our Quantum Security Analysts have been investigating exactly how to program a Quantum Computer to crack AES.
They are working with Artificial Intelligence (AI) ChatGPT 4o, a very competent Quantum Systems Analyst and Programmer, to research, develop and simulate these Quantum programs.
They have completed three very different Quantum Programs that all run on today's Quantum Computer, and they all prove that AES must be replaced by Quantum Safe encryption immediately.
If you are technically minded, see links to AES Quantum Cracks in resources below.
The time for AES security is up...
The most urgent action for security professionals, data custodians, and organisations Word-Wide is to come to grips with the fact that:
AES is Quantum Toast!
Claims that "AES is still safe if strong keys are used" and "AES is safe until quantum computers become cryptographically relevant" have caused the quantum threat to AES to be ignored, shelved, delayed, avoided...
AES quantum resistance expired in 2022!
There is no runway left, we must rotate NOW.
All data, document and communication security that relies on AES or other classic block encryption is now compromised.
Suddenly we have the biggest global cybersecurity problem in all history, estimated to affect millions of companies, billions of devices and users.
This is your wake up call, your heads up to a real and present security problem that affects the entire global IT and Internet infrastructure - AES is not Quantum Safe.
All classic encryption must now be replaced or augmented by Quantum Safe Encryption.
The reason this has not raised concerns before is inaccurate narratives as to the AES quantum cybersecurity threat timeline.
The cybersecurity industry, computer and device manufacturers, operating system and software application developers suddenly have a mission-critical task; to upgrade to Quantum Safe encryption and recover lost security.
IT companies and institutions must factor significant impacts and costs to fund this mammoth upgrade.
They key to progress is awareness, and the Portalz team have worked tirelessly to alert the World - share this web!
NIST have 'quantum resistant RSA replacement candidates', but no 'Quantum Safe replacements for AES:
It is very tough to beat quantum computers
instant key cracking capabilities.
Portalz has become a world leader in Quantum Safe Cryptography for symmetric key encryption.
Over six years of fractal R&D we manifested an entirely new cryptographic art and science; Fractal Transformation (FT).
Initially considered 'an interesting encryption variation', it soon became apparent that FT is the first method of encryption that is impenetrable by any computational means - including quantum computers.
Impenetrable Encryption
is a World-First
Impenetrable Encryption is what is required in the Quantum Computing Era, that's what it takes to be Quantum Safe.
We continue our ground breaking cryptographic R&D.
Fractal Transformation is a very flexible and capable technology, with many variations possible. We have researched a significant range of these variations.
FES is a specific selection of FT parameters and algorithms to arrive at an optimum standard that can be implemented as the Worlds Quantum Safe Standard.
Our web contains FES details, explanations and proofs here.
For now, take it at face value that FES is indeed the worlds first impenetrable encryption and that it is the quantum safe replacement for AES. We have not received any challenge to our published proofs.
For enquiries please contact: info@portalz.solutions