U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

approved

Definition(s):

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation or 3) specified in a list of NIST-approved security functions.
Source(s):
NIST SP 800-102 under Approved

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either: 1) Specified in a FIPS or NIST Recommendation, 2) Adopted in a FIPS or NIST Recommendation, or 3) Specified in a list of NIST-approved security functions.
Source(s):
NIST SP 800-106 under Approved

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, 2) adopted in a FIPS or NIST Recommendation or 3) specified in a list of NIST-approved security functions.
Source(s):
NIST SP 800-107 Rev. 1 under Approved
NIST SP 800-135 Rev. 1 under Approved

  is used to mean that an algorithm is specified in a FIPS or NIST Recommendation (published as a NIST Special Publication).
Source(s):
NIST SP 800-125B under Approved

  FIPS-approved and/or NIST-recommended.
Source(s):
NIST SP 800-133 Rev. 2 under Approved

  FIPS-approved or NIST-Recommended.
Source(s):
NIST SP 800-90B under Approved

  FIPS approved or NIST recommended: an algorithm or technique that is either 1) specified in a FIPS or a NIST Recommendation, or 2) adopted in a FIPS or a NIST Recommendation.
Source(s):
NIST SP 800-38B under Approved
NIST SP 800-38D under Approved

  FIPS approved or NIST recommended: an algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation.
Source(s):
NIST SP 800-38C under Approved

  FIPS-approved or NIST-recommended: an algorithm or technique that is either 1) specified in a FIPS or a NIST Recommendation, or 2) adopted in a FIPS or a NIST Recommendation.
Source(s):
NIST SP 800-38F

  FIPS-approved or NIST-Recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation and specified either (a) in an appendix to the FIPS or NIST Recommendation, or (b) in a document referenced by the FIPS or NIST Recommendation.
Source(s):
NIST SP 800-56B Rev. 2 under Approved

  FIPS-approved or NIST-recommended: an algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation.
Source(s):
NIST SP 800-67 Rev. 2 under Approved

  FIPS-Approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation and specified in an appendix to the FIPS or NIST Recommendation.
Source(s):
NIST SP 800-89 under Approved

  FIPS-approved, NIST-Recommended and/or validated by the Cryptographic Algorithm Validation Program (CAVP).
Source(s):
NIST SP 800-90A Rev. 1 under Approved

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) specified elsewhere and adopted by reference in a FIPS or NIST Recommendation.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Approved

  FIPS-Approved and/or NIST-recommended. An algorithm or technique that is either: 1) specified in a FIPS or NIST Recommendation or 2) specified elsewhere and adopted by reference in a FIPS or NIST Recommendation.
Source(s):
NIST SP 800-175B Rev. 1 under Approved

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation or 2) specified elsewhere and adopted by reference in a FIPS or NIST Recommendation.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Approved

  FIPS-approved or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation or 2) adopted in a FIPS or NIST Recommendation and specified either (a) in an appendix to the FIPS or NIST Recommendation or (b) in a document referenced by the FIPS or NIST Recommendation.
Source(s):
NIST SP 800-208

  An algorithm or technique for a specific cryptographic use that is specified in a FIPS or NIST Recommendation, adopted in a FIPS or NIST Recommendation, or specified in a list of NIST-approved security functions.
Source(s):
NIST SP 800-108r1

  An algorithm or technique that is either 1) specified in a Federal Information Processing Standard (FIPS) or NIST Recommendation, 2) adopted in a FIPS or NIST Recommendation, or 3) specified in a list of NIST-approved security functions.
Source(s):
NIST SP 800-56C Rev. 2 under Approved