Could you link some good explanation? My understanding is that Grover<span style=“font-size:4px”>not Furr</span>'s algorithm basically turns AES-256 into AES-128
Personally I am still paranoid tho about what might happen in the future.
I think it’s reasonable to be in some cases where you are sharing sensitive data that you can’t afford to possibly be broken by governments or whoever in a decade or more from now.
The thing to do with truly important data is to cascade algorithms. That is encrypt it using multiple algorithms so a failure in one in a cryptographic sense means they still need a failure in another and if the combined failures cannot shave off enough bits they still can’t get the data. AES is fairly strong and proven so I would use it as one of those encryption schemes. Ideally you’d do this with ciphers from multiple mutually hostile governments (one from Russia, one from US/NATO).
I’ve done a little bit of reading. I don’t trust AES-256 in the long term, they need to upgrade the standards.
Could you link some good explanation? My understanding is that Grover<span style=“font-size:4px”>not Furr</span>'s algorithm basically turns AES-256 into AES-128
Well reading this it tells that the key is very hard to guess, and the algorithm is solid enough that the key cannot be guessed by looking at the data… https://www.n-able.com/blog/aes-256-encryption-algorithm
And the government and institutions use it so… https://www.clickssl.net/blog/256-bit-encryption
Personally I am still paranoid tho about what might happen in the future. I think it’s reasonable to be in some cases where you are sharing sensitive data that you can’t afford to possibly be broken by governments or whoever in a decade or more from now.
The thing to do with truly important data is to cascade algorithms. That is encrypt it using multiple algorithms so a failure in one in a cryptographic sense means they still need a failure in another and if the combined failures cannot shave off enough bits they still can’t get the data. AES is fairly strong and proven so I would use it as one of those encryption schemes. Ideally you’d do this with ciphers from multiple mutually hostile governments (one from Russia, one from US/NATO).
nah nah nah just roll your own crypto
(Only half joking: worthless in a targeted attack but effective over unmanned dragnet)
Yea I figure if you have anything truly important or prone to being targeted then… It doesn’t cost you much to over do it compared to not.