Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols

Approved

Acronym(s):

None

Definition(s):

  FIPS-approved or NIST recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation and specified in either the FIPS or NIST Recommendation, or in a document referenced by the FIPS or NIST Recommendation.
Source(s): FIPS 198-1

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation or 3) specified in a list of NIST approved security functions.
Source(s): FIPS 186-4
NIST SP 800-57 Part 3 Rev. 1

  FIPS-Approved and/or NIST-recommended.
Source(s): FIPS 140-2
NIST SP 800-133 (Superceded by Rev. 1)

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation or 3) specified in a list of NIST-approved security functions.
Source(s): NIST SP 800-102

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either:
1) Specified in a FIPS or NIST Recommendation,
2) Adopted in a FIPS or NIST Recommendation, or
3) Specified in a list of NIST-approved security functions.

Source(s): NIST SP 800-106

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either
1) specified in a FIPS or NIST Recommendation,
2) adopted in a FIPS or NIST Recommendation or
3) specified in a list of NIST-approved security functions.

Source(s): NIST SP 800-107 (Superceded by Rev. 1)

  FIPS approved or NIST Recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation or 3) specified in a list of NIST Approved security functions.
Source(s): NIST SP 800-108

  FIPS-approved or NIST Recommended. An algorithm or technique that meets at least one of the following:
1) is specified in a FIPS or NIST Recommendation,
2) is adopted in a FIPS or NIST Recommendation or
3) is specified in a list of NIST-approved security functions (e.g., specified as approved in the annexes of FIPS 140-2).

Source(s): NIST SP 800-120

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is 1) specified in a FIPS or NIST Recommendation; or 2) adopted in a FIPS or NIST Recommendation; or 3) specified in a list of NIST-approved security functions.
Source(s): NIST SP 800-132

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, 2) adopted in a FIPS or NIST Recommendation or 3) specified in a list of NIST-approved security functions.
Source(s): NIST SP 800-135 Rev. 1

  FIPS-Approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST recommendation, or 2) specified elsewhere and adopted by reference in a FIPS or NIST Recommendation.
Source(s): NIST SP 800-21 Second edition (NIST SP 800-57)
NIST SP 800-57 Part 1 Rev. 3

  FIPS approved or NIST Recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation or 3) specified in a list of NIST-approved security functions.
Source(s): NIST SP 800-56C

  FIPS-Approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation and specified either in an appendix to the FIPS or NIST Recommendation, or in a document referenced by the FIPS or NIST Recommendation.
Source(s): NIST SP 800-57 Part 2

  Federal Information Processing Standard (FIPS) approved or NIST recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation.
Source(s): NIST SP 800-63-2

  FIPS-Approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation and specified in an appendix to the FIPS or NIST Recommendation.
Source(s): NIST SP 800-89

  FIPS-approved, NIST-Recommended and/or validated by the Cryptographic Algorithm Validation Program (CAVP).
Source(s): NIST SP 800-90A Rev. 1

  FIPS-approved or NIST-Recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation and specified either (a) in an appendix to the FIPS or NIST Recommendation, or (b) in a document referenced by the FIPS or NIST Recommendation.
Source(s): NIST SP 800-56A Rev. 2

  Federal Information Processing Standards (FIPS)-approved or NIST-recommended. An algorithm or technique that meets at least one of the following: 1) is specified in a FIPS or NIST Recommendation, 2) is adopted in a FIPS or NIST Recommendation or 3) is specified in a list of NIST-approved security functions (e.g., specified as approved in the annexes of FIPS 140 [FIPS 140]).
Source(s): NIST SP 800-56B Rev. 1

  FIPS-approved or NIST-recommended: an algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation.
Source(s): NIST SP 800-67 Rev. 1

  FIPS approved or NIST recommended: an algorithm or technique that is either 1) specified in a FIPS or a NIST Recommendation, or 2) adopted in a FIPS or a NIST Recommendation.
Source(s): NIST SP 800-38B
NIST SP 800-38D

  FIPS approved or NIST recommended: an algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation.
Source(s): NIST SP 800-38C

  FIPS-approved or NIST-recommended: an algorithm or technique that is either 1) specified in a FIPS or a NIST Recommendation, or 2) adopted in a FIPS or a NIST Recommendation.
Source(s): NIST SP 800-38F

  An algorithm is specified in a FIPS or NIST Recommendation (published as a NIST Special Publication).
Source(s): NIST SP 800-135 Rev. 1

Synonym(s):

None

See Also: