Advanced Encryption Standard (AES): What It Is and How It Works – Hashed Out by The SSL Store – Hashed Out by The SSL Store
Understanding advanced encryption standard on basic level doesnt require a higher degree in computer science or Matrix-level consciousness lets break AES encryption down into laymans terms
Hey, all. We know of security of information to be a hot topic since, well, forever. We entrust our personal and sensitive information to lots of major entities and still have problems with data breaches, data leaks, etc. Some of this happens because of security protocols in networking, or bad practices of authentication management but, really, there are many ways that data breaches can occur. However, the actual process of decrypting a ciphertext without a key is far more difficult. For that, we can thank the encrypting algorithms like the popular advanced encryption standard and the secure keys that scramble our data into indecipherable gibberish.
Lets look into how AES works and different applications for it. Well be getting a little into some Matrix-based math so, grab your red pills and see how far this rabbit hole goes.
Lets hash it out.
You may have heard of advanced encryption standard, or AES for short but may not know the answer to the question what is AES? Here are four things you need to know about AES:
The National Institute of Standards and Technology (NIST) established AES as an encryption standard nearly 20 years ago to replace the aging data encryption standard (DES). After all, AES encryption keys can go up to 256 bits, whereas DES stopped at just 56 bits. NIST could have chosen a cipher that offered greater security, but the tradeoff would have required greater overhead that wouldnt be practical. So, they went with one that had great all-around performance and security.
AESs results are so successful that many entities and agencies have approved it and utilize it for encrypting sensitive information. The National Security Agency (NSA), as well as other governmental bodies, utilize AES encryption and keys to protect classified or other sensitive information. Furthermore, AES is often included in commercial based products, including but limited to:
Although it wouldnt literally take forever, it would take far longer than any of our lifetimes to crack an AES 256-bit encryption key using modern computing technology. This is from a brute force standpoint, as in trying every combination until we hear the click/unlocking sound. Certain protections are put in place to prevent stuff from like this happening quickly, such as a limit on password attempts before a lockdown, which may or may not include a time lapse, to occur before trying again. When we are dealing with computation in milliseconds, waiting 20 minutes to try another five times would seriously add to the time taken to crack a key.
Just how long would it take? We are venturing into a thousand monkeys working on a thousand typewriters to write A Tale of Two Cities territory. The possible combinations for AES 256-bit encryption is 2256. Even if a computer can do multiple quadrillions of instructions per second, then we are still in that eagles-wings-eroding-Mount-Everest time frame.
Needless to say, its waaaaaaaaaaaaaaaaaaay (theres not enough memory on our computers to support the number of a letters that I want to convey) longer than our current universe has been in existence. And thats just for a 16-byte block of data. So, as you can see, brute forcing AES even if it is 128 bits AES is futile.
That would likely change, though, once quantum computing becomes a little more mainstream, available, and effective. Quantum computing is expected to break AES encryption and require other methods to protect our data but thats still a ways down the road.
Manage Digital Certificates like a Boss
14 Certificate Management Best Practices to keep your organization running, secure and fully-compliant.
To better understand what AES is, you need to understand how it works. But in order to see how the advanced encryption standard actually works, however, we first need to look at how this is set up and the rules concerning the process based on the users selection of encryption strength. Typically, when we discuss using higher bit levels of security, were looking at things that are more secure and more difficult to break or hack. While the data blocks are broken up into 128 bits, the key size have a few varying lengths: 128 bits, 196 bits, and 256 bits. What does this mean? Lets back it up for a second here.
We know that encryption typically deals in the scrambling of information into something unreadable and an associated key to decrypt the scramble. AES scramble procedures use four scrambling operations in rounds, meaning that it will perform the operations, and then repeat the process based off of the previous rounds results X number of times. Simplistically, if we put in X and get out Y, that would be one round. We would then put Y through the paces and get out Z for round 2. Rinse and repeat until we have completed the specified number of rounds.
The AES key size, specified above, will determine the number of rounds that the procedure will execute. For example:
As mentioned, each round has four operations.
So, youve arrived this far. Now, you may be asking: why, oh why, didnt I take the blue pill?
Before we get to the operational parts of advanced encryption standard, lets look at how the data is structured. What we mean is that the data that the operations are performed upon is not left-to-right sequential as we normally think of it. Its stacked in a 44 matrix of 128 bits (16 bytes) per block in an array thats known as a state. A state looks something like this:
So, if your message was blue pill or red, it would look something like this:
So, just to be clear, this is just a 16-byte block so, this means that every group of 16 bytes in a file are arranged in such a fashion. At this point, the systematic scramble begins through the application of each AES encryption operation.
As mentioned earlier, once we have our data arrangement, there are certain linked operations that will perform the scramble on each state. The purpose here is to convert the plaintext data into ciphertext through the use of a secret key.
The four types of AES operations as follows (note: well get into the order of the operations in the next section):
As mentioned earlier, the key size determines the number of rounds of scrambling that will be performed. AES encryption uses the Rjindael Key Schedule, which derives the subkeys from the main key to perform the Key Expansion.
The AddRoundKey operation takes the current state of the data and executes the XOR Boolean operation against the current round subkey. XOR means Exclusively Or, which will yield a result of true if the inputs differ (e.g. one input must be 1 and the other input must be 0 to be true). There will be a unique subkey per round, plus one more (which will run at the end).
The SubBytes operation, which stands for substitute bytes, will take the 16-byte block and run it through an S-Box (substitution box) to produce an alternate value. Simply put, the operation will take a value and then replace it by spitting out another value.
The actual S-Box operation is a complicated process, but just know that its nearly impossible to decipher with conventional computing. Coupled with the rest of AES operations, it will do its job to effectively scramble and obfuscate the source data. The S in the white box in the image above represents the complex lookup table for the S-Box.
The ShiftRows operation is a little more straightforward and is easier to understand. Based off the arrangement of the data, the idea of ShiftRows is to move the positions of the data in their respective rows with wrapping. Remember, the data is arranged in a stacked arrangement and not left to right like most of us are used to reading. The image provided helps to visualize this operation.
The first row goes unchanged. The second row shifts the bytes to the left by one position with row wrap around. The third row shifts the bytes one position beyond that, moving the byte to the left by a total of two positions with row wrap around. Likewise, this means that the fourth row shifts the bytes to the left by a total of three positions with row wrap around.
The MixColumns operation, in a nutshell, is a linear transformation of the columns of the dataset. It uses matrix multiplication and bitwise XOR addition to output the results. The column data, which can be represented as a 41 matrix, will be multiplied against a 44 matrix in a format called the Gallois field, and set as an inverse of input and output. That will look something like the following:
As you can see, there are four bytes in that are ran against a 44 matrix. In this case, matrix multiplication has each input byte affecting each output byte and, obviously, yields the same size.
Now that we have a decent understanding of the different operations utilized to scramble our data via AES encryption, we can look at the order in which these operations execute. It will be as such:
Note: The MixColumns operation is not in the final round. Without getting into the actual math of this, theres no additional benefit to performing this operation. In fact, doing so would simply make the decryption process a bit more taxing in terms of overhead.
If we consider the number of rounds and the operations per round that are involved, by the end of it, you should have a nice scrambled block. And that is only a 16-byte block. Consider how much information that equates to in the big picture. Its miniscule when compared to todays file/packet sizes! So, if each 16-byte block has seemingly no discernable pattern at least, any pattern that can be deciphered in a timely manner Id say AES has done its job.
We know the advanced encryption standard algorithm itself is quite effective, but its level of effectiveness depends on how its implemented. Unlike the brute force attacks mentioned above, effective attacks are typically launched on the implementation and not on the algorithm itself. This can be equated to attacking users as in phishing attacks versus attacking the technology behind the service/function that may be hard to breach. These can be considered side-channel attacks where the attacks are being carried out on other aspects of the entire process and not the focal point of the security implementation.
While I always advocate going with a reasonable/effective security option, a lot of AES encryption is happening without you even knowing it. Its locking down spots of the computing world that would otherwise be wide open. In other words, there would be many more opportunities for hackers to capture data if advanced encryption standard wasnt implemented at all. We just need to know how to identify the open holes and figure out how to plug them. Some may be able to use AES and others may need another protocol or process.
Appreciate the encryption implementations we have, use the best ones when needed, and happy scrutinizing!
- The Best Quantum Computing Stocks to Buy Today - Yahoo Finance - April 12th, 2026 [April 12th, 2026]
- 3 Quantum Computing Stocks with Potential to Beat the Market 4/10/2026 - TipRanks - April 12th, 2026 [April 12th, 2026]
- Why Quantum Computing Is Becoming a Strategic Lever in Materials Innovation - Wipro - April 12th, 2026 [April 12th, 2026]
- What Are the Best Quantum Computing Stocks to Buy in 2026? - CoinCentral - April 12th, 2026 [April 12th, 2026]
- Adam Back Says Quantum Threat to Bitcoin Is Decades Away, Urges Gradual Migration to Post-Quantum Security - Bitcoin Magazine - April 10th, 2026 [April 10th, 2026]
- Infleqtion and NASA Deploy Upgraded Quantum Hardware to International Space Station - Quantum Computing Report - April 10th, 2026 [April 10th, 2026]
- Long-term undervaluation lifts Quantum Computing stock to a 4.87% daily increase - Traders Union - April 10th, 2026 [April 10th, 2026]
- Up 1,460% Since 2024, Is It Too Late to Buy This Quantum Computing Leader? - Yahoo Finance - April 8th, 2026 [April 8th, 2026]
- Up 1,460% Since 2024, Is It Too Late to Buy This Quantum Computing Leader? - The Motley Fool - April 8th, 2026 [April 8th, 2026]
- Future of Quantum Computing | High-Speed Processing, AI Synergy - openPR.com - April 8th, 2026 [April 8th, 2026]
- Fully Programmable Quantum Computing With Trapped-ions - Quantum Zeitgeist - April 8th, 2026 [April 8th, 2026]
- News Explorer Quantum Computing Poses Potential Threats to Bitcoin, But Current Research Shows Limitations - Decrypt - April 8th, 2026 [April 8th, 2026]
- Quantum Computing Market to Reach US$ 22.75 Billion by 2033 - openPR.com - April 8th, 2026 [April 8th, 2026]
- A Cryptography Engineers Perspective on Quantum Computing Timelines - OODAloop - April 8th, 2026 [April 8th, 2026]
- Why the mind-bending physics of quantum computing is terrifying for bitcoin and crypto - CoinDesk - April 7th, 2026 [April 7th, 2026]
- Q-Factor emerges with $24M in funding and the next big bet to achieve quantum computing advantage - SiliconANGLE - April 7th, 2026 [April 7th, 2026]
- Alex Pruden: Quantum computing threatens elliptic curve cryptography, advancements could lead to utility-scale systems by decade's end, and the urgent... - April 7th, 2026 [April 7th, 2026]
- Lloyds Bank uses quantum computing to detect money mules - The Times - April 7th, 2026 [April 7th, 2026]
- SpinQ Technology Raises Nearly 1 Billion CNY ($145.3M USD) to Scale Industrial Quantum Computing - Quantum Computing Report - April 5th, 2026 [April 5th, 2026]
- Is Rigetti Computing the Best Quantum Computing Stock to Buy Right Now? - fool.com - April 5th, 2026 [April 5th, 2026]
- SpinQ Technology Secures Nearly 1 Billion Chinese Yuan in Series C Funding to Scale Industrial Superconducting Quantum Computing - The Quantum Insider - April 5th, 2026 [April 5th, 2026]
- Q&A: AWS on new AI agents, quantum computing in healthcare - MobiHealthNews - April 5th, 2026 [April 5th, 2026]
- QuiX Quantum Demonstrates Below-Threshold Error Mitigation in Photonic Quantum Computing for First Time - HPCwire - April 5th, 2026 [April 5th, 2026]
- Google says there's a 10% chance quantum computing will crack bitcoin cryptography by 2032 - PC Gamer - April 5th, 2026 [April 5th, 2026]
- Solana begins testing defenses against 'quantum-computing threat' "Stronger security leads to slower performance" - bloomingbit - April 5th, 2026 [April 5th, 2026]
- 'No Need to Panic': Binance Founder Says Crypto Can Survive Quantum Computing Threat by Upgrading - Yahoo Finance - April 5th, 2026 [April 5th, 2026]
- Clocking Quantum Instability: A New Process Could Open Pathways to Reliable Quantum Computing - thedebrief.org - April 5th, 2026 [April 5th, 2026]
- University of Chicago using "self-driving" lab in quantum computing research - CBS News - April 5th, 2026 [April 5th, 2026]
- IBM Advances Quantum Computing Research: Will it Boost Prospects? - sg.finance.yahoo.com - April 5th, 2026 [April 5th, 2026]
- Safeguarding cryptocurrency by disclosing quantum vulnerabilities responsibly - research.google - April 1st, 2026 [April 1st, 2026]
- New Teaching Approach Could Open The Door to Quantum Computing - The Quantum Insider - April 1st, 2026 [April 1st, 2026]
- EPB Joins Southeastern Quantum Collaborative to Support Regional Infrastructure Integration - Quantum Computing Report - April 1st, 2026 [April 1st, 2026]
- Google warns quantum computing may break bitcoin earlier than thought, prepares 2029 transition - The Block - April 1st, 2026 [April 1st, 2026]
- Alice & Bob secures 3.4 million ARPA-E award to discover rare-earth-free magnets using quantum computing - BeBeez International - April 1st, 2026 [April 1st, 2026]
- 1 Unstoppable Quantum Computing Stock to Buy Before It Soars 200%, According to 1 Wall Street Analyst - finance.yahoo.com - April 1st, 2026 [April 1st, 2026]
- Is Ciscos Quantum Networking Push With Atom Computing Reshaping Its AI Infrastructure Story (CSCO)? - finance.yahoo.com - April 1st, 2026 [April 1st, 2026]
- Changpeng Zhao dismisses 'quantum computing fears' "No need to be scared" - bloomingbit - April 1st, 2026 [April 1st, 2026]
- UMass Amherst and UCSB Demonstrate Photonic Chip Technology for Miniaturized Quantum Systems - Quantum Computing Report - April 1st, 2026 [April 1st, 2026]
- "Even if the odds of quantum computing success are low, preparation is needed" - bloomingbit - April 1st, 2026 [April 1st, 2026]
- The Best Quantum Computing Stock to Buy With $1,000 Right Now - The Motley Fool - April 1st, 2026 [April 1st, 2026]
- Oxford University's Natalia Ares on why quantum computing beats zeros and ones - reuters.com - April 1st, 2026 [April 1st, 2026]
- Quantum leap: U of S becomes national hub for advanced computing - 620 CKRM - April 1st, 2026 [April 1st, 2026]
- The Historical Trend of Bitcoin Suggests a Potential Rebound, While Concerns Over Quantum Computing Threaten the Industry - NAI500 - April 1st, 2026 [April 1st, 2026]
- 1 Unstoppable Quantum Computing Stock to Buy Before It Soars 200%, According to 1 Wall Street Analyst - The Motley Fool - March 30th, 2026 [March 30th, 2026]
- More Innovation through Different Computation: Quantum Computing and the New Substrate of Science - The Foundation for American Innovation - March 30th, 2026 [March 30th, 2026]
- Prediction: These 2 Quantum Computing Stocks Will Soar Over the Next 5 Years - The Motley Fool - March 30th, 2026 [March 30th, 2026]
- Opinion | Quantum Computing Is Todays Manhattan Project - WSJ - March 30th, 2026 [March 30th, 2026]
- Rigetti Computing Intends to Invest $100 Million in UK to Accelerate Quantum Computing Development - thequantuminsider.com - March 30th, 2026 [March 30th, 2026]
- Quantum computing offers a path beyond AI's limits in drug discovery - - March 30th, 2026 [March 30th, 2026]
- Digital Currency Risks 2026: Regulation, Environment & Quantum Computing - News and Statistics - indexbox.io - March 30th, 2026 [March 30th, 2026]
- Quantum Computing Poses Urgent Cybersecurity ThreatsAnd Opportunities - broadbandbreakfast.com - March 28th, 2026 [March 28th, 2026]
- Quantum computing firm Xanadu starts trading on TSX - Castanet - March 28th, 2026 [March 28th, 2026]
- US-China tech war: Who will win the global quantum computing race? - uk.investing.com - March 28th, 2026 [March 28th, 2026]
- Google Issues New Warning About the Quantum Computing Security Apocalypse - Gizmodo - March 26th, 2026 [March 26th, 2026]
- Quantum Computing Is on Its Way to Transforming Science. Inside IBMs Latest Breakthrough. - Barron's - March 26th, 2026 [March 26th, 2026]
- Quantum computing cybersecurity risk - Are we ready? - I by IMD - imd.org - March 26th, 2026 [March 26th, 2026]
- Analyzing National Quantum-Computing Ecosystems in the Indo-Pacific - The National Bureau of Asian Research (NBR) - March 26th, 2026 [March 26th, 2026]
- When Will Quantum Computing Deliver Real Business Value? - AZoQuantum - March 26th, 2026 [March 26th, 2026]
- Energy and physical resource impacts of quantum computing merit greater attention - Nature - March 26th, 2026 [March 26th, 2026]
- Cisco and Atom Computing Partner on Quantum Networking for Scalable Computing - The Quantum Insider - March 26th, 2026 [March 26th, 2026]
- Fujitsu and The University of Osaka Implement Early-FTQC Framework for Chemical Calculations - Quantum Computing Report - March 26th, 2026 [March 26th, 2026]
- IBM Stock Quantum Computing Breakthrough Confirmed in Landmark Simulation - CoinCentral - March 26th, 2026 [March 26th, 2026]
- Atom Computing Announces Strategic Collaboration with Cisco to Advance Scalable, Networked, and Distributed Quantum Computing - PR Newswire - March 26th, 2026 [March 26th, 2026]
- City approves $500,000 in economic incentives for quantum computing business - The Business Journals - March 26th, 2026 [March 26th, 2026]
- ANELLO Photonics and Q-CTRL Partner to Deliver Quantum-Resilient Navigation for UAVs - Quantum Computing Report - March 26th, 2026 [March 26th, 2026]
- A Look At Quantum Computing Inc. (QUBT) Valuation After The OFC 2026 Quantum Security Demo With Ciena - simplywall.st - March 24th, 2026 [March 24th, 2026]
- Quantum-Computing Stocks Are Trading at 100 Times Revenue -- Here's Why Buffett-Style Investors Are Staying Cautious - The Motley Fool - March 18th, 2026 [March 18th, 2026]
- SEEQC Validates Scalable Quantum Computing Architecture with On-Chip Control Breakthrough - citybiz - March 18th, 2026 [March 18th, 2026]
- Pasqal Introduces New Integration with NVIDIA CUDA-Q to Enhance Its Hybrid Quantum Computing Environment for HPC - The Quantum Insider - March 18th, 2026 [March 18th, 2026]
- IBM Fellow and Quantum Pioneer Charles H. Bennett Receives A.M. Turing Award, Computing's Highest Honor - PR Newswire - March 18th, 2026 [March 18th, 2026]
- U.K. to Spend $2.5 Billion on Quantum Computing. What It Means for IonQ Stock. - Barron's - March 18th, 2026 [March 18th, 2026]
- Kvantify Collaborates with Atom Computing and Aarhus University on Quantum Drug Discovery Research - HPCwire - March 18th, 2026 [March 18th, 2026]
- UK Government Commits 2B to Quantum Computing Procurement and Industry Scale-Up - HPCwire - March 18th, 2026 [March 18th, 2026]
- The More I Look At Quantum Computing, The More I Like It: Upgrading To Buy (QUBT) - Seeking Alpha - March 18th, 2026 [March 18th, 2026]
- The future of the battlefield runs right through quantum computing: IONQ CEO - Fox Business - March 11th, 2026 [March 11th, 2026]
- Xanadu: Partnership With University Of Marylands ARLIS To Advance Quantum Computing Security - Pulse 2.0 - March 11th, 2026 [March 11th, 2026]
- Pioneering Quantum-Supercomputing Integration: U.S. Leadership in the Next Computing Era - CSIS | Center for Strategic and International Studies - March 11th, 2026 [March 11th, 2026]
- Xanadu Joins University of Maryland's ARLIS to Advance the Security of Quantum Computing - Yahoo Finance - March 11th, 2026 [March 11th, 2026]
- Xanadu and AMD Team Up Ahead of Trading Debut. Quantum Computing Meets Aerospace. - Barron's - March 11th, 2026 [March 11th, 2026]
- 2 Top Quantum Computing Stocks to Buy in March - The Motley Fool - March 11th, 2026 [March 11th, 2026]