1. A well-defined computational procedure that takes variable inputs, including a cryptographic key, and produces an output.
Sources:
CNSSI 4009-2015
under cryptographic algorithm (crypto-algorithm)
2. Well-defined procedure or sequence of rules or steps, or a series of mathematical equations used to describe cryptographic processes such as encryption/decryption, key generation, authentication, signatures, etc.
Sources:
CNSSI 4009-2015
under cryptographic algorithm (crypto-algorithm)
from
NSA/CSS Manual Number 3-16 (COMSEC)
A well-defined computational procedure that takes variable inputs, often including a cryptographic key, and produces an output.
Sources:
NIST SP 800-152
A well-defined computational procedure that takes variable inputs, including a cryptographic key, and produces an output.
Sources:
NIST SP 1800-21B
under Cryptographic Algorithm
from
CNSSI 4009-2015
NIST SP 800-57 Part 1 Rev. 5
A well-defined computational procedure that takes variable inputs, including a cryptographic key (if applicable), and produces an output.
Sources:
NIST SP 800-175A
NIST SP 800-175B Rev. 1
A well-defined computational procedure that takes variable inputs (often including a cryptographic key) and produces an output.
Sources:
NIST SP 800-133 Rev. 2