The following is a list of algorithms with example values for each algorithm. This list may not always accurately reflect all Approved* algorithms. Please refer to the actual algorithm specification pages for the most accurate list of algorithms.
Visit the Block Cipher Techniques Page
FIPS 197 - Advanced Encryption Standard (AES)
SP 800-67 - Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
FIPS 185 - Escrowed Encryption Standard containing the Skipjack algorithm
Visit the Block Cipher Techniques Page
SP 800-38A - Recommendation for Block Cipher Modes of Operation: Methods and Techniques
SP 800-38B - Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
SP 800-38C - Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality
SP 800-38D - Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
SP 800-38F - Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping
SP 800-38G -Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption
Visit the Digital Signatures Page
FIPS 186-4 - Digital Signature Standard
SHA-2 | SHA-512/t | SHA-3 | |
P-224 | SHA-224 | SHA-512/224 | SHA3-224 |
P-256 | SHA-256 | SHA-512/256 | SHA3-256 |
P-384 | SHA-384 | SHA3-384 | |
P-521 | SHA-512 | SHA3-512 | |
K-233 | SHA-224 | SHA-512/224 | SHA3-224 |
K-283 | SHA-256 | SHA-512/256 | SHA3-256 |
K-409 | SHA-384 | SHA3-384 | |
K-571 | SHA-512 | SHA3-512 | |
B-233 | SHA-224 | SHA-512/224 | SHA3-224 |
B-283 | SHA-256 | SHA-512/256 | SHA3-256 |
B-409 | SHA-384 | SHA3-384 | |
B-571 | SHA-512 | SHA3-512 |
FIPS 180-2 - Secure Hash Standard
FIPS 202 - SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions
Input Message Length | ||||||
0-bit | 5-bit | 30-bit | 1600-bit | 1605-bit | 1630-bit | |
SHA3-224 | file | file | file | file | file | file |
SHA3-256 | file | file | file | file | file | file |
SHA3-384 | file | file | file | file | file | file |
SHA3-512 | file | file | file | file | file | file |
SHAKE128 | file | file | file | file | file | file |
SHAKE256 | file | file | file | file | file | file |
Samples to illustrate SHAKE128 for output bit lengths that are not divisible by 8.
SP 800-185 - SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash
SP 800-56A - Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logorithm Cryptography
Visit the Random Bit Generation Page
Deterministic Generators