I have a rather particular classmate who wholeheartedly believes that there isn't such a thing as reasonably secure cryptography and that most people can steal encrypted data. I have attempted to explain (with must frustration) the security of AES. I often attempt to make points about how certain implementations and stream ciphers can result in data leaks, but AES in practice with proper implementations is feasibly unbreakable.
I am trying to find a way to present that AES is secure when everything is done correctly by developers. Any help to explain this to someone who is not cryptographically inclined would be a great help.
I have attempted to explain the math and just how large the keyspace is; the amount of energy required to bruteforce a key; econmical impacts of cracking the cipher, and with no avail.
You're right that IF everything is done correctly by the developers AND the users, then AES is secure for a very long time (quite possibly millions of years, even with quantum computers). The issue with AES is that it's rather hard to do everything correctly. The algorithm is almost never the weakest link in cryptography, it's almost always the opsec (humans) involved. Also AES isn't authenticated, GCM is hard to implement, etc. There are better ciphers IMO. ChaCha20-Poly1305, for instance. Easier to implement/use, bigger security margin.
– SAI Peregrinus May 16 '17 at 04:21