ALERT
Security Notice

AES is Quantum Toast

The End of Block Encryption

Imagine a world where the most trusted encryption system in use is no longer secure.

That world is now!

The Problem: AES Encryption is Vulnerable to Quantum Computers

AES encryption protects your privacy, medical and bank information, personal emails, and so much more.

It’s been considered the gold standard in digital security for decades, but now — Quantum Computers have made it obsolete.

We have quantum computers today that can crack AES encryption in seconds, no matter how strong the key.

It’s not a matter of if it will happen — it’s happening now.

Why Quantum Computers Can Crack AES Encryption

  1. They Have Enough Qubits Right Now:
    Modern quantum computers have enough qubits to crack AES encryption. And these qubits are not like classical bits (0s and 1s). They have a powerful property — superposition.
  2. Superposition Allows Quantum Computers to Explore All Combinations Simultaneously:
    Qubits can exist in a range of states between 0 and 1, instead of just being one or the other.
    This allows quantum computers to explore all possible combinations of keys simultaneously.
    In other words, quantum computers can try every possible key for AES at the same time, rather than testing them one by one like classical computers.

This means that a quantum computer can crack AES encryption almost instantly by testing every possible key in parallel — and finding the correct one much faster than any classical computer could.

Key Takeaways:

  1. Quantum computers have enough qubits now to crack AES encryption.
  2. Superposition allows quantum computers to explore all possible key combinations at the same time — making AES encryption vulnerable.
AES Security Foundations

Classic Computer Brute-Force

It takes classic computers a very long time to brute-force AES because the number of distinct key combinations is very large.

To appreciate how large take a look at this table:

Key Comb Decimal Combinations
128 bit 2128 340,282,366,920,938,463,463
,374,607,431,768,211,456
192 bit 2192 6,277,101,735,386,680,763,835
,789,423,207,666,416,102
,355,444,464,034,512,896
256 bit 2256 115,792,089,237,316,195,423
,570,985,008,687,907,853
,269,984,665,640,564,039
,457,584,007,913,129,639,936

These are very large numbers, and in order for a classic computers to process each combination it must 'count' through each one like an odometer.

Encryption Decryption Asymmetry

AES relies for its security on the fact that classic computers take a long time to test each possible combination.

It relies on 'Encryption Decryption Asymmetry', a cryptographic term that means 'fast to encrypt and slow to brute-force decrypt'.

AES also relies on quality keys for its security. While the number of possible combinations is very large, you may be able to 'guess' a combination from password lists and other techniques.

AES reliance on contemporary computer speed and architecture for its security means that it has always been vulnerable.

The Quantum Revolution

Bits v Qubits

The remarkable capability of Quantum Computers to process data simultaneously threatens AES.

Let's compare classic bits with quantum computer qubits:

This is the shocking reality of the quantum encryption threat.

The Flatow Algorithms

AES Cracks on Today's Quantum Computers

The Flatow Algorithms turn quantum computers into AES decryption machines without needing perfect qubits or years of development.

Our Quantum Security Analysts have been investigating exactly how to program a Quantum Computer to crack AES.

They are working with Artificial Intelligence (AI) ChatGPT 4o, a very competent Quantum Systems Analyst and Programmer, to research, develop and simulate these Quantum programs.

They have completed three very different Quantum Programs that all run on today's Quantum Computer, and they all prove that AES must be replaced by Quantum Safe encryption immediately.

If you are technically minded, see links to AES Quantum Cracks in resources below.

Urgent Action

Clear and Present Danger

The time for AES security is up...

The most urgent action for security professionals, data custodians, and organisations Word-Wide is to come to grips with the fact that:

AES is Quantum Toast!

Claims that "AES is still safe if strong keys are used" and "AES is safe until quantum computers become cryptographically relevant" have caused the quantum threat to AES to be ignored, shelved, delayed, avoided...

AES quantum resistance expired in 2022!

There is no runway left, we must rotate NOW.

Quantum Safe is the new Standard

All data, document and communication security that relies on AES or other classic block encryption is now compromised.

Suddenly we have the biggest global cybersecurity problem in all history, estimated to affect millions of companies, billions of devices and users.

This is your wake up call, your heads up to a real and present security problem that affects the entire global IT and Internet infrastructure - AES is not Quantum Safe.

All classic encryption must now be replaced or augmented by Quantum Safe Encryption.

The reason this has not raised concerns before is inaccurate narratives as to the AES quantum cybersecurity threat timeline.

The cybersecurity industry, computer and device manufacturers, operating system and software application developers suddenly have a mission-critical task; to upgrade to Quantum Safe encryption and recover lost security.

IT companies and institutions must factor significant impacts and costs to fund this mammoth upgrade.

They key to progress is awareness, and the Portalz team have worked tirelessly to alert the World - share this web!

Solutions

What Solutions Exist?

NIST have 'quantum resistant RSA replacement candidates', but no 'Quantum Safe replacements for AES:

It is very tough to beat quantum computers
instant key cracking capabilities.

Portalz has become a world leader in Quantum Safe Cryptography for symmetric key encryption.

Over six years of fractal R&D we manifested an entirely new cryptographic art and science; Fractal Transformation (FT).

Initially considered 'an interesting encryption variation', it soon became apparent that FT is the first method of encryption that is impenetrable by any computational means - including quantum computers.

Impenetrable Encryption
is a World-First

Impenetrable Encryption is what is required in the Quantum Computing Era, that's what it takes to be Quantum Safe.

We continue our ground breaking cryptographic R&D.

The Fractal Encryption Standard (FES)

The Quantum Safe Standard

Fractal Transformation is a very flexible and capable technology, with many variations possible. We have researched a significant range of these variations.

FES is a specific selection of FT parameters and algorithms to arrive at an optimum standard that can be implemented as the Worlds Quantum Safe Standard.

Our web contains FES details, explanations and proofs here.

For now, take it at face value that FES is indeed the worlds first impenetrable encryption and that it is the quantum safe replacement for AES. We have not received any challenge to our published proofs.

Resources

Flatow Algorithms:

Quantum Safe Solutions:

Contact:

For enquiries please contact: info@portalz.solutions