Every article about encryption says "AES-256" like it's a magic word. "Military-grade encryption." "Bank-level security." "AES-256 protected." These phrases are on every VPN website, every cloud storage provider, every messaging app. But what does AES-256 actually mean? And how do you actually use it?
AES stands for Advanced Encryption Standard. It's an algorithm — a specific set of mathematical operations that scrambles data so it can't be read without the key.
256 refers to the key size: 256 bits. Think of it as the combination on a lock. A 256-bit key means there are 2256 possible combinations. That's a number with 77 digits. For perspective:
In short: nobody is guessing the key. Not with current computers, not with quantum computers in the foreseeable future, not with anything we can currently imagine.
AES is a block cipher. It breaks your data into 128-bit blocks (16 bytes each) and processes each block through a series of operations:
These four operations repeat for 14 rounds (10 rounds for AES-128, 12 for AES-192, 14 for AES-256). Each round uses a different portion of the expanded key. After 14 rounds of substitution, shifting, mixing, and key combination, the original data is thoroughly scrambled.
Decryption runs the operations in reverse. Same key, reverse order of operations, original data comes out.
AES is the algorithm. GCM is the mode — how the algorithm is applied to data larger than one 16-byte block.
GCM (Galois/Counter Mode) does two things:
This means if someone modifies even a single bit of the encrypted file, the authentication check fails during decryption. You know the file was tampered with. Older modes like CBC (Cipher Block Chaining) encrypt data but don't detect tampering — an attacker could modify encrypted data without you knowing.
You type a password like "MySecretPassword123." AES-256 needs a 256-bit key — exactly 32 bytes of random-looking data. How does a human-readable password become a cryptographic key?
The answer is PBKDF2 (Password-Based Key Derivation Function 2):
The 100,000 iterations are deliberate. Each password guess takes 100,000 hash operations, which makes brute-force attacks extremely slow. An attacker trying millions of passwords would need millions × 100,000 hash operations. The salt ensures that two people using the same password get different keys.
| Algorithm | Key Size | Status | Used By |
|---|---|---|---|
| AES-256 | 256 bits | ✓ Current standard (NIST) | Governments, banks, VPNs, cloud providers |
| AES-128 | 128 bits | ✓ Still secure | Web browsers (TLS), some applications |
| DES | 56 bits | ✗ Broken (1999) | Nothing — deprecated, insecure |
| 3DES | 168 bits | ✗ Deprecated (2023) | Legacy systems being migrated off |
| ChaCha20 | 256 bits | ✓ Modern, secure | Google, WireGuard VPN, mobile apps |
| Twofish | 256 bits | ✓ Secure | VeraCrypt, niche applications |
| RSA | 2048-4096 bits | ✓ Secure (asymmetric) | Key exchange, digital signatures (not file encryption) |
AES-256 is not the only strong algorithm, but it is the most tested, most audited, and most widely deployed. Decades of cryptanalysis have not found a practical weakness.
The File Password Protector uses AES-256-GCM with PBKDF2 (100,000 iterations). It runs in your browser using the Web Crypto API — the same cryptographic engine that secures your HTTPS connections. Drop a file in, set a password, and you have an AES-256 encrypted file in seconds.
AES-256-GCM encryption. In your browser. Free.
Encrypt a File →