This is a potential security issue, you are being redirected to https://csrc.nist.gov
[04-05-2013] -- The First International Cryptographic Module Conference
Bringing experts together from around the world to confer on the topic of cryptographic modules. Discussion on technical topics underlying the implementation of a cryptographic module including physical security, key management, side-channel analysis, key management, cryptographic algorithm implementation testing, standardization (FIPS 140-2, ISO/IEC 19790), validation programs and more. September 24-26, 2013 in Gaithersburg, MD. Registration February through August 2013. Details at: ICMC 2013
[04-23-2012] -- Validation of Transitioning Cryptographic Algorithms and Key Lengths
The Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program Â has been updated to include IG G.14 which addresses how the validation of cryptographic algorithms by the CAVP and the validation of cryptographic modules by the CMVP will be affected during the transition as specified in SP 800-131A. This transition guidance was originally drafted as SP800-131B but has been moved to the CMVP Implementation Guidance IG G.14.
[04-23-2012] -- Validating the Transition from FIPS 186-2 to FIPS 186-3
The Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program has been updated to include IG G.15 which addresses the transition plan specific to the validation of FIPS 186-2 and FIPS 186-3. This transition plan addresses both the cryptographic algorithm validations and the cryptographic module validations that are conducted by the CAVP and CMVP, respectively. This transition guidance was originally drafted as SP800-131C but has been moved to the CMVP Implementation Guidance IG G.15
[11-24-2010] -- References to NIST Draft Special Publications of interest: NIST Draft Special Publications
Nov. 19, 2010 Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for PIV
Sep. 23, 2010 Special Publication 800-56C DRAFT Recommendation for Key Derivation through Extraction-then-Expansion
Aug. 30, 2010 Special Publication 800-135 DRAFT Recommendation for Existing Application-Specific Key Derivation Functions
Jun. 24, 2010 Special Publication 800-132 DRAFT Recommendation for Password-Based Key Derivation - Part 1: Storage Applications
Jun. 16, 2010 Special Publication 800-131 DRAFT Recommendation for the Transitioning of Cryptographic Algorithms and Key Sizes
[08-17-2009] -- Comments received on White Paper: The Transitioning of Cryptographic Algorithms and Key Sizes
[07-02-2009] -- White Paper: The Transitioning of Cryptographic Algorithms and Key Sizes
Comments are requested on the white paper "The Transitioning of Cryptographic Algorithms and Key Sizes" by August 3, 2009. Please provide comments to CryptoTransitions@nist.gov.