Implementation guideGLOBAL

FIPS Crypto Algorithms AES (FIPS 197)

AES is the FIPS-approved block cipher for confidentiality, but most failures come from unsafe use around the cipher.

This page explains what FIPS 197 specifies and how to use AES safely in real systems.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Sections
4

Structured answer sets in this page tree.

Primary sources
4

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

FIPS 197, updated on 9 May 2023 as FIPS 197 upd1, specifies the Advanced Encryption Standard. It defines three members of the Rijndael family: AES-128, AES-192, and AES-256. All use a fixed 128-bit block size, and the key length determines the variant. The practical engineering problem is not the round function itself. It is safe usage: approved mode selection, IV or nonce rules, key handling, and evidence that your implementation matches your assurance claims.

Section 1

What FIPS 197 specifies and what it leaves to other guidance

FIPS 197 is the algorithm standard. It defines AES as a symmetric block cipher with a fixed 128-bit block and key lengths of 128, 192, or 256 bits.

It does not by itself specify a secure application profile for files, APIs, or network protocols. The standard says AES shall be used with a FIPS-approved or NIST-recommended mode of operation. That means teams have to govern the full bundle: AES plus mode plus IV or nonce rules plus key lifecycle.

  • Variants: AES-128, AES-192, AES-256
  • Block size: 128 bits
  • Implementations may be software, firmware, hardware, or a combination
  • Mode selection and object identifiers are handled through related NIST resources such as CSOR
Section 2

Safe AES usage means controlling the full bundle

Most AES failures are not failures of the cipher. They are failures of mode choice, IV reuse, weak key separation, or sloppy error handling.

Treat AES usage as a controlled bundle. If any one part of the bundle is uncontrolled, the overall design can fail even when the algorithm is correct.

  • Use only approved or recommended modes that match the protocol and threat model
  • Define IV or nonce generation rules in code and tests, not only in documentation
  • Separate keys by purpose so encryption keys do not become general-purpose secrets
  • Make failure handling explicit so padding, tag, or decryption errors do not leak useful signals
Section 3

Implementation discipline that reduces audit and validation pain

AES deployments go wrong when secure defaults are optional or when different runtimes quietly pick different configurations. The safest pattern is to publish a narrow approved-configuration set per supported product version and environment.

That matters even more in FIPS 140-3 contexts, because the approved-mode story must be consistent across documentation, test evidence, and runtime behavior.

  • Pin libraries, firmware, accelerators, and build flags for the validated or reviewed configuration
  • Make configuration drift visible with manifests or startup checks
  • Retain test vectors, known-answer tests, and integration evidence for each supported build
  • Document where AES is used, for what purpose, and under which operational constraints
Section 4

What evidence is worth retaining

Even if you are not pursuing immediate module validation, customers and internal reviewers will ask the same questions: where is AES used, what parameters are allowed, and how do you prevent misuse.

Build the evidence pack as a byproduct of engineering work rather than as a late-stage audit exercise.

  • Crypto inventory entry showing service, mode, key size, and owner
  • Configuration evidence such as build flags, manifests, and runtime policy
  • Verification artifacts such as known-answer tests and interoperability tests
  • Key-management records covering generation, storage, rotation, and destruction
  • Change-control history for algorithm, mode, or dependency updates
Recommended next step

Use FIPS Crypto Algorithms AES (FIPS 197) as a cited research workflow

Research Copilot can take FIPS Crypto Algorithms AES (FIPS 197) from getting cited answers and faster research on this topic to a reusable workflow inside Sorena. Teams working on FIPS Crypto Algorithms can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Primary sources

References and citations

Related guides

Explore more topics