FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation or 3) specified in a list of NIST-approved security functions.
Sources:
FIPS 186-5
under Approved
NIST SP 800-102
under Approved
FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST recommendation, 2) adopted in a FIPS or NIST recommendation, or 3) specified in a list of NIST-approved security functions.
Sources:
FIPS 203
FIPS 204
FIPS 205
from
FIPS 186-5
FIPS-approved and/or NIST-recommended. An algorithm or technique that is either:
1) Specified in a FIPS or NIST Recommendation,
2) Adopted in a FIPS or NIST Recommendation, or
3) Specified in a list of NIST-approved security functions.
Sources:
NIST SP 800-106
under Approved
FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, 2) adopted in a FIPS or NIST Recommendation or 3) specified in a list of NIST-approved security functions.
Sources:
NIST SP 800-107 Rev. 1
under Approved
NIST SP 800-135 Rev. 1
under Approved
FIPS-approved and/or NIST-recommended.
Sources:
NIST SP 800-133 Rev. 2
under Approved
FIPS-approved or NIST-Recommended.
Sources:
NIST SP 800-90B
under Approved
FIPS approved or NIST recommended: an algorithm or technique that is either 1) specified in a FIPS or a NIST Recommendation, or 2) adopted in a FIPS or a NIST Recommendation.
Sources:
NIST SP 800-38B
under Approved
NIST SP 800-38D
under Approved
FIPS approved or NIST recommended: an algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation.
Sources:
NIST SP 800-38C
under Approved
FIPS-approved or NIST-recommended: an algorithm or technique that is either 1) specified in a FIPS or a NIST Recommendation, or 2) adopted in a FIPS or a NIST Recommendation.
Sources:
NIST SP 800-38F
FIPS-approved or NIST-Recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation and specified either (a) in an appendix to the FIPS or NIST Recommendation, or (b) in a document referenced by the FIPS or NIST Recommendation.
Sources:
NIST SP 800-56B Rev. 2
under Approved
FIPS-approved or NIST-recommended: an algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation.
Sources:
NIST SP 800-67 Rev. 2
under Approved
FIPS-Approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation and specified in an appendix to the FIPS or NIST Recommendation.
Sources:
NIST SP 800-89
under Approved
FIPS-approved, NIST-Recommended and/or validated by the Cryptographic Algorithm Validation Program (CAVP).
Sources:
NIST SP 800-90A Rev. 1
under Approved
FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) specified elsewhere and adopted by reference in a FIPS or NIST Recommendation.
Sources:
NIST SP 800-57 Part 2 Rev.1
under Approved
FIPS-Approved and/or NIST-recommended. An algorithm or technique that is either: 1) specified in a FIPS or NIST Recommendation or 2) specified elsewhere and adopted by reference in a FIPS or NIST Recommendation.
Sources:
NIST SP 800-175B Rev. 1
under Approved
FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation or 2) specified elsewhere and adopted by reference in a FIPS or NIST Recommendation.
Sources:
NIST SP 800-57 Part 1 Rev. 5
under Approved
FIPS-approved or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation or 2) adopted in a FIPS or NIST Recommendation and specified either (a) in an appendix to the FIPS or NIST Recommendation or (b) in a document referenced by the FIPS or NIST Recommendation.
Sources:
NIST SP 800-131A Rev.2
NIST SP 800-208
An algorithm or technique for a specific cryptographic use that is specified in a FIPS or NIST Recommendation, adopted in a FIPS or NIST Recommendation, or specified in a list of NIST-approved security functions.
Sources:
NIST SP 800-108r1
[August 2022 (Includes updates as of 02-02-2024)]
An algorithm or technique that is either 1) specified in a Federal Information Processing Standard (FIPS) or NIST Recommendation, 2) adopted in a FIPS or NIST Recommendation, or 3) specified in a list of NIST-approved security functions.
Sources:
NIST SP 800-56C Rev. 2
under Approved