TL;DR there are only two ways a GPG encrypted file can get compromised: By guessing the password or by using a backdoored GPG with a crippled AES cipher (or a vulnerable version of GPG that leaks AES keys). If you construct your diceware password without a computer and use a recent official GPG build with the default settings you should be safe. And also, you only need 10 diceware words to get 128 bits of entropy, each word is about
12.92 bits of entropy so 12 words will actually give you more, about 155 bits of entropy.
First let's assume the attacker does not know you used diceware.
For guessing the password, an attacker who knows nothing about it's composition will just run a brute force attack with every combination of graphical ASCII characters, and you can figure out that this takes too long to succeed.
There are 128-32-1=95 printable ASCII characters people usually make passwords from. So they make 95^1 + 95^2 + ... + 95^(N, the max length of password they're willing to crack) guesses to get the password. It's an astronomical number of guesses they have to make so we can rule out the possibility of someone successfully doing that for not small N. Even if they only tried cracking N length passwords they still have to do 95^N guesses.
Now let's assume they do know you used diceware and that your entropy came from things like coin flips and dice rolls so that the entropy is truly random. Even if they knew that and also how many words are in your diceware phrase, they still have to make 7776^(number of words) guesses to exhaust the entire random space. A diceware list has
7776 words in it.
So if you use 12 words in your diceware, and each of the words are on average 6 characters long, then they have to make 7776^12 = about 2^155 diceware guesses, or without using any diceware knowledge, a 95^(6*10+ 5 spaces) = 2^427 65-character brute force guesses (or an uncountable number of layman's 1,2,..,65-character brute force guesses). So the size of the random space to search dramatically drops with diceware but that isn't sometime to worry about because it's still too high to be exhausted by modern machines in the foreseeable future.
The AES cipher implementations used in GPG should be secure, given that there aren't any reported CVEs about it on
https://www.cvedetails.com/vulnerability-list/vendor_id-4711/Gnupg.html. In fact, there are only 27 vulnerabilities reported on the entire program.
If you want maximum security you should download the GPG binaries or compile their source from their website, and verify the signature of what you download to make sure it's official. There have been cases of linux distributions getting compromised and delivering malicious packages so someone can theoretically replace the bundled official GPG with their own flawed GPG release. However, that particular case hasn't happened yet so if you only have a bundled GPG it should be safe to use that too (until such a case does play out, then I personally would migrate away from the impacted distribution).
In any case, if someone steals the encrypted file from Google drive, they have to go through all of the above labor to crack open the file.
P.s. Even quantum computers won't break AES 128 bit. Fully functional quantum computers will reduce the search space from 2128 to 264 which is still far away from being broken / insecure.
AES-256 can still withstand quantum computers because Grover's algorithm used in quantum computers would break it in 2^128 rounds. I don't think there's an optimization to half the AES-192 search space yet, at least according to
stack exchange.