Pretty unlikely that brute-forcing a 128-bit key is even possible, given today’s technology.
A few minutes on bc (gotta pimp my linux calculator. :)) tells me this:
2^128 is 340,282,366,920,938,463,463,374,607,431,768,211,456 or about 3.4x10[sup]38[/sup]. That’s a really big number.
Given that there are about 31 million seconds in a year, and assuming that the NSA’s super-duper cipher cracker can try 10[sup]27[/sup] (1 billion billion billion) keys per second*** (an outrageously generous estimate), it would take about 10,780 years to exhaust a 128-bit keyspace. Which is longer than we’ve had recorded civilization. On average you only have to search 1/2 the keyspace to find your answer, so my secrets will be safe from the NSA, on average, for about 5,300 years.
That’s mathematically, of course. There is, in fact, a much better way to get your encryption key: Lock you in a room with Vinny and Sal and a couple of baseball bats until you give up the key. This is not only more efficient, but much more effective.
And I’m backing you on the difference between public-key and secret-key crypto keysize. To break an n-bit RSA (for example) key, all you have to do is factor an n-bit number into its two prime factors. Not easy, by any means, but it’s a much better way than trying every possible key. That’s why RSA and Diffie-Hellman have such larger keysizes.
*** Also assuming the fastest way to break AES, Blowfish, IDEA, or whatever algo you’re using, is to try every possible key. Which may not be true. See RSA, for example.