Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 023

AES-GCM

What is AES-GCM?

AES-GCMAn authenticated encryption mode that combines AES in counter mode with a GHASH-based authentication tag for confidentiality and integrity in a single pass.


AES-GCM (Galois/Counter Mode) is the authenticated encryption with associated data (AEAD) mode standardised in NIST SP 800-38D. It uses AES (128-bit block, 128/192/256-bit keys) in CTR mode for encryption and a GF(2^128) GHASH function to produce a 128-bit authentication tag over the ciphertext and additional authenticated data. AES-GCM is the default cipher suite for TLS 1.2/1.3, IPsec, SSH, and 802.11ac because of its parallelisability and AES-NI hardware acceleration. Its main weakness is catastrophic failure on IV reuse: repeating a 96-bit nonce under the same key allows recovery of the authentication key and plaintext, so nonces must be unique per key.

Examples

  1. 01

    TLS 1.3 cipher suite TLS_AES_128_GCM_SHA256.

  2. 02

    Disk encryption and per-record encryption in cloud KMS services.

Frequently asked questions

What is AES-GCM?

An authenticated encryption mode that combines AES in counter mode with a GHASH-based authentication tag for confidentiality and integrity in a single pass. It belongs to the Cryptography category of cybersecurity.

What does AES-GCM mean?

An authenticated encryption mode that combines AES in counter mode with a GHASH-based authentication tag for confidentiality and integrity in a single pass.

How does AES-GCM work?

AES-GCM (Galois/Counter Mode) is the authenticated encryption with associated data (AEAD) mode standardised in NIST SP 800-38D. It uses AES (128-bit block, 128/192/256-bit keys) in CTR mode for encryption and a GF(2^128) GHASH function to produce a 128-bit authentication tag over the ciphertext and additional authenticated data. AES-GCM is the default cipher suite for TLS 1.2/1.3, IPsec, SSH, and 802.11ac because of its parallelisability and AES-NI hardware acceleration. Its main weakness is catastrophic failure on IV reuse: repeating a 96-bit nonce under the same key allows recovery of the authentication key and plaintext, so nonces must be unique per key.

How do you defend against AES-GCM?

Defences for AES-GCM typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for AES-GCM?

Common alternative names include: Galois/Counter Mode, AES-128-GCM, AES-256-GCM.

Related terms

See also