Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Standards and Guidelines

Project Links

Examples with Intermediate Values

The following is a list of algorithms with example values for each algorithm. This list may not always accurately reflect all Approved* algorithms. Please refer to the actual algorithm specification pages for the most accurate list of algorithms.

Visit the Block Cipher Techniques Page

FIPS 197 - Advanced Encryption Standard (AES)

SP 800-67 - Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher

FIPS 185 - Escrowed Encryption Standard containing the Skipjack algorithm

Visit the Block Cipher Techniques Page

SP 800-38A - Recommendation for Block Cipher Modes of Operation: Methods and Techniques

SP 800-38B - Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication

SP 800-38C - Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality

SP 800-38D - Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC

SP 800-38F - Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping

SP 800-38G -Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption

Visit the Digital Signatures Page

FIPS 186-4 - Digital Signature Standard

Visit the Hash Functions page

FIPS 180-2 - Secure Hash Standard


FIPS 202 - SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

  Input Message Length
0-bit 5-bit 30-bit 1600-bit 1605-bit 1630-bit
SHA3-224 file file file file file file
SHA3-256 file file file file file file
SHA3-384 file file file file file file
SHA3-512 file file file file file file
SHAKE128 file file file file file file
SHAKE256 file file file file file file


Samples to illustrate SHAKE128 for output bit lengths that are not divisible by 8.

SP 800-185 - SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash

Visit the Key Management Page

SP 800-56A - Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logorithm Cryptography

  • Finite Field Cryptography based Samples
    • All Domain Parameter Sizes
  • Elliptic Curve Cryptography

Visit the Random Bit Generation Page

Deterministic Generators

Note: An algorithm or technique that is either specified in a FIPS or NIST Recommendation.

 

Created December 29, 2016, Updated February 12, 2018