What is AES-256 encryption?

Encryption graphic
(Image credit: Olemedia / Getty Images)

You may have seen some VPN providers boasting about using AES-256 encryption, but it’s not immediately apparent what this means or how it helps keep your data safe.

Essentially, VPNs use encryption to make sure that third parties can’t read your internet traffic while it’s travelling between your computer and whatever online service you’re accessing.

AES-256 is one of the most secure encryption standards available today, and is the industry standard when it comes to protecting data. You'll often see it referred to as "military grade," but it's also used by banks, the government, and even common apps like WhatsApp and Signal.

That’s why the best VPNs use AES-256 to keep your data private when it's being transferred. Here, we’ll be going over exactly why AES-256 is considered so secure, as well as how it works and why it’s a necessary part of your VPN connection.

NordVPN: the best VPN that uses AES-256 encryption$3.39 per month

NordVPN: the best VPN that uses AES-256 encryption
Based on our testing, NordVPN is the number one VPN on the market. Not only is it super secure, with class-leading privacy that has been proven by independent audits, it's also super speedy and can unblock basically every streaming service you can think of. Prices for a 2-year plan start at $3.39 per month, and there's even a 30-day money-back guarantee so you can try it out, risk-free.

What is AES-256 encryption?

AES-256 is a highly secure encryption protocol that is used to power private communication software across the globe, which of course includes VPN providers.

It was developed by the National Institute of Standards and Technology (NIST) in 1997 as part of an initiative to replace the US government standard at the time, DES, with a new, stronger encryption standard less vulnerable to brute force attacks.

AES stands for Advanced Encryption Standard, and the "256" in AES-256 refers to the length of the encryption key, which consists of 256 bits.

There’s so much confidence in the mathematics behind AES-256 that the NSA has approved it for encrypting top-secret classified documents.

The security of AES-256 stems from its large key size, making it virtually impossible to crack using brute-force attacks. While other encryption protocols like ChaCha20 prioritize speed and efficiency, AES-256 is specifically optimized for security.

The most private VPNs will only offer encryption protocols that are known to be bullet-proof against decryption attacks, which is why AES-256 is so popular as an encryption method.

There’s so much confidence in the mathematics behind AES-256 that the National Security Agency (NSA) has approved it for encrypting top-secret classified documents.

How does AES-256 encryption work?

AES-256 encryption takes a file or stream of data that you want to encrypt and transforms it using a “key,” so that the data you end up with is completely unreadable and totally different from what you started with.

The number at the end of AES refers to how large the key used to carry out this operation is in terms of bits. Larger keys are harder to break, so using 256-bit keys gives you the maximum amount of security against cryptographic attacks. Currently, even the most advanced supercomputers are unable to break AES through brute force.

AES-256 encryption operates using a symmetric key encryption system, which means that the same key is used to both encrypt and decrypt data. Essentially, decrypting a file with the same key just means applying all of the processes used to encrypt the key in reverse.

You might use a normal string password if you’re using AES-256 to encrypt or decrypt a file, but this password is transformed into a true 256-bit key before the algorithm actually begins.

The encryption process involves blocks of multiple steps, with each block being referred to as "rounds." Each round involves a series of transformations which are repeated between rounds, with the difference being that every round uses a new 128-bit key derived from the overall master 256-bit key used to carry out the process.

The actual process is as follows:

  • The target data is segmented into 128-bit blocks for processing.
  • Each 128-bit block is transformed into a 4x4 byte array for which is used as input for each round. AES-256 uses 14 rounds of encryption.
  • For every round, the scheduled round key is broken into a similar byte array and applied to the original block using an XOR operation.
  • The bytes in the block then go through substitution, transposition, and mixing.
  • Once the rounds have been completed on every block, the target data is considered encrypted.

This is still a slight simplification of how AES-256 actually works, but you can check out the original NIST publication if you need more detail.

A digital image depicting end to end encryption via a padlock surrounded by glowing lines

(Image credit: Getty Images)

Why is VPN encryption important?

Encryption is arguably the most important part of any VPN product. When you connect to a VPN, your data is encrypted before leaving your device. Without strong encryption, all of your data would be visible to prying eyes like your ISP, governments, and even potentially hackers.

Encryption algorithms like AES keep the secure tunnels you need to route your traffic through completely safe. AES-256 is virtually impenetrable by current standards, which is why the US government has trusted the algorithm for so long.

It’s not just the government, either: militaries, banks, and corporations across the world trust AES-256 to keep their data secure. Most secure VPNs will offer OpenVPN with some form of AES implemented, but for total confidence you should look for AES-256.

AES is only part of the puzzle though. It’s a symmetric key algorithm, so there’s one flaw with it.

It’s not just the government, either: militaries, banks, and corporations across the world trust AES-256 to keep their data secure

Anyone who has the password can encrypt and decrypt data at will. That means it’s unsuitable for starting up an encrypted connection, as you’d have to send the password over an unencrypted line to the other party you want to communicate with. This is where RSA, which is an asymmetric key algorithm, comes into play.

Because the encryption and decryption keys for RSA are different, you can send your AES keys encrypted using someone else’s encryption key knowing only they can decrypt it with their private decryption keys.

The reason we don’t use RSA for securing traffic tunnels is that it’s a relatively expensive, slow algorithm. AES, on the other hand, has been built from the ground up to be an extremely fast algorithm that can run even on relatively low-power systems without trouble.

Sam Dawson
VPN and cybersecurity expert

Sam Dawson is a cybersecurity expert who has over four years of experience reviewing security-related software products. He focuses his writing on VPNs and security, previously writing for ProPrivacy before freelancing for Future PLC's brands, including TechRadar. Between running a penetration testing company and finishing a PhD focusing on speculative execution attacks at the University of Kent, he still somehow finds the time to keep an eye on how technology is impacting current affairs.

With contributions from

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
ExpressVPN
ExpressVPN's latest upgrade secures its spot as the most quantum-safe VPN
VPN graphic on yellow background
What is a VPN protocol?
Cartoon image of VPN on computer screen
What is OpenVPN?
How does a VPN work?
How does a VPN work?
NordVPN logo on a blue background
NordVPN Double VPN – what is it and why should you use it?
What is a VPN?
What is a VPN?
Latest in VPNs
Hacker typing on laptop in darkened room
Hackers create "BRUTED" tool to attack VPNs – how to stay safe
NordProtect logo on black background
NordVPN's NordProtect cyber insurance goes solo – and adds a key new feature
Proton VPN logo and in-app screenshots
"If you control online, you control everything" – Proton is taking the fight to internet censorship
Chelsea Manning speaking at the NymVPN launch event
Chelsea Manning-backed NymVPN launches in bid to win the "censorship arms race"
ExpressVPN
Calling all students! Protect your online privacy with ExpressVPN's exclusive offer
White NymVPN logo on green graphic background
Introducing NymVPN – could this be the world's most secure VPN?
Latest in Features
Casetify Bounce Suitcase
I ditched my Away Carry-On for a bright red suitcase made by a phone case brand, and I was shocked by how much I liked it
Astell and Kern HB1
I just turned my wired audio headphones into Bluetooth cans with this DAC — and the sound quality is shockingly good
Bare feet poking out of the covers at the end of a bed
Twitching in your sleep? Expert shares 5 most common causes of hypnic jerks
Half-Life 2 RTX
I just went back to Ravenholm in Half-Life 2 RTX — Nvidia’s new RTX remix tech makes it 10x more terrifying
a photo of a man in the gym with strong abs
It's not leg raises — try the 'dragon flag' exercise to strengthen your abs and hips instead
woman doing side plank exercise
Ditch sit-ups — strengthen and define your core with 1 dumbbell and this 5-move ab workout