| ▲ | aborsy 2 hours ago | ||||||||||||||||||||||
I don’t know why the author likes AES 128 so badly. AES 256 adds little additional cost, and protects against store now decrypt later attacks (and situations like: “my opinion suddenly changed in few months”). The industry standard and general recommendation for quantum resistant symmetric encryption is using 256 bit keys, so just follow that. Every time he comes up with all sorts of arguments that AES 128 is good. Age should be using 256 bit file keys, and default to PC keys in asymmetric mode. | |||||||||||||||||||||||
| ▲ | FiloSottile 15 minutes ago | parent | next [-] | ||||||||||||||||||||||
> The industry standard and general recommendation for quantum resistant symmetric encryption is using 256 bit keys It simply is not. NIST and BSI specifically recommend all of AES-128, AES-196, and AES-256 in their post-quantum guidance. All of my industry peers I have discussed this with agree that AES-128 is fine for post-quantum security. It's a LinkedIn meme at best, and a harmful one at that. My opinion changed on the timeline of CRQC. There is no timeline in which CRQC are theorized to become a threat to symmetric encryption. | |||||||||||||||||||||||
| ▲ | cwmma 2 hours ago | parent | prev [-] | ||||||||||||||||||||||
he pretty explicitly states that AES 128 is not in any imminent danger and mandating a switch to 256 would distract from the actual thing he thinks needs to happen. | |||||||||||||||||||||||
| |||||||||||||||||||||||