If the IT forces of a whole state are used to crack one encrypted file, it will be cracked, sooner or later.