NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage
Search CSRC:

EXAMPLE ALGORITHMS

The following is a list of algorithms with example values for each algorithm. This list may not always accurately reflect all Approved* algorithms. Please refer to the actual algorithm specification pages for the most accurate list of algorithms. Links for each cryptographic primative are provided below, or go directly to the CryptoToolkit Home Page.


Back to Top

Encryption - Block Ciphers

Visit the Block Ciphers Page

FIPS 197 - Advanced Encryption Standard (AES)

SP 800-67 - Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher

FIPS 185 - Escrowed Encryption Standard containing the Skipjack algorithm


Back to Top

Block Cipher Modes

Visit the Block Cipher Modes Page

SP 800-38A - Recommendation for Block Cipher Modes of Operation: Methods and Techniques

SP 800-38B - Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication

SP 800-38C - Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality

SP 800-38D - Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC

SP 800-38F - Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping


Back to Top

Digital Signatures

Visit the Digital Signatures Page

FIPS 186-4 - Digital Signature Standard


Back to Top

Secure Hashing

Visit the Secure Hashing Page

FIPS 180-2 - Secure Hash Standard


FIPS 202 - SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

The following SHA-3 Examples are provided for reference only; they should not be considered official until FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions is approved.

  Input Message Length
0-bit 5-bit 30-bit
SHA3-224 file file file
SHA3-256 file file file
SHA3-384 file file file
SHA3-512 file file file
SHAKE128 file file file
SHAKE256 file file file

 

Back to Top

Key Management

Visit the Key Management Page

SP 800-56A - Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logorithm Cryptography

  • Finite Field Cryptography based Samples
    • All Domain Parameter Sizes
  • Elliptic Curve Cryptography

Back to Top

Random Number Generation

Visit the Random Number Generation Page

Deterministic Generators


Back to Top

Message Authentication

Visit the Message Authentication Page

FIPS 198 - The Keyed-Hash Message Authentication Code (HMAC)


Note: An algorithm or technique that is either specified in a FIPS or NIST Recommendation.