Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

AES (Advanced Encryption Standard)

A symmetric encryption algorithm widely used to protect sensitive data at rest and in transit.

AES, or Advanced Encryption Standard, is a symmetric-key encryption algorithm that uses the same key for both encrypting and decrypting data. Adopted by the U.S. government in 2001 as a replacement for the aging DES standard, AES has become the most widely used encryption algorithm in the world. It operates on fixed block sizes of 128 bits and supports key lengths of 128, 192, or 256 bits.

How It Works

AES encrypts data through a series of transformation rounds. Each round applies a sequence of substitution, permutation, and mixing operations to the plaintext block. The number of rounds depends on the key length: 10 rounds for 128-bit keys, 12 for 192-bit, and 14 for 256-bit. Each round uses a unique round key derived from the original encryption key through a process called key expansion.

The algorithm processes data in 128-bit blocks arranged in a 4x4 matrix of bytes called the state. During each round, four operations transform the state: SubBytes (byte substitution), ShiftRows (row shifting), MixColumns (column mixing), and AddRoundKey (XOR with the round key). These operations together provide both confusion and diffusion, making the encrypted output appear random and resistant to pattern analysis.

AES can operate in several modes such as CBC (Cipher Block Chaining), GCM (Galois/Counter Mode), and CTR (Counter Mode). GCM is particularly popular in modern applications because it provides both encryption and authentication, ensuring data integrity alongside confidentiality.

Why It Matters

AES protects virtually everything in modern computing. HTTPS connections, VPN tunnels, encrypted databases, file encryption, and wireless network security all rely on AES. When a security assessment reveals that an application uses weak or deprecated encryption algorithms like DES or RC4, the standard recommendation is migration to AES-256-GCM.

Understanding AES is essential for evaluating whether an application properly protects sensitive data. Weak key management, incorrect mode selection, or reused initialization vectors can undermine even AES encryption, creating exploitable vulnerabilities in otherwise secure-looking systems.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment