NIST Mandates 2035 Shift: Why Your RSA Encryption Dies Before AES-256 Does

Post date: April 1, 2026 · Discovered: April 17, 2026 · 3 posts, 26 comments

The US federal government has set an official deadline for migrating to Post-Quantum Cryptography (PQC) standards by 2035, following NIST standardization efforts.

Commenters split sharply between existential panic and technical patience. Some voices demand immediate action, citing a 'finite window for migration.' Others, like supersquirrel, argue the threat timeline is far from immediate. Rossphorus cuts through the noise: the real quantum danger isn't to AES-256—which is deemed relatively secure—but to the *asymmetric* key exchange that makes it work. Conversely, BrikoX claims much of the current internet still relies on weak, outdated methods.

The consensus points away from the symmetric ciphers. The critical failure point identified by multiple users is the asymmetric key exchange. While the hardware barrier remains (rando), the immediate, actionable vulnerability is centered on the known shortcomings of RSA, forcing an adherence to the NIST timeline.

Key Points

SUPPORT

Asymmetric cryptography is the primary vulnerability, not symmetric ones.

Rossphorus detailed that the weakness lies in the key exchange mechanisms, not AES-256.

SUPPORT

The federal deadline for transition is 2035.

NIST/US Federal Government established this goal, creating a concrete migration target.

SUPPORT

Current infrastructure lags behind necessary quantum-proof standards.

BrikoX noted that much of the internet still runs on weaker methods.

SUPPORT

AES-256 maintains high resilience against near-term quantum attacks.

Rossphorus calculated the attack strength loss as only 254.4 bits, suggesting relative safety.

MIXED

The immediate quantum threat timeline is overstated or uncertain.

supersquirrel argued that the development time required for a capable quantum computer requires more time.

Source Discussions (3)

This report was synthesized from the following Lemmy discussions, ranked by community score.

85
points
Quantum computers need vastly fewer resources than thought to break vital encryption
[email protected]·14 comments·4/1/2026·by BrikoX·arstechnica.com
22
points
Just 10,000 quantum bits might crack internet encryption schemes
[email protected]·0 comments·4/1/2026·by inimzi·sciencenews.org
20
points
The first quantum computer to break encryption is now shockingly close
[email protected]·12 comments·4/1/2026·by supersquirrel·newscientist.com