U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

approved

Definition(s):

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation or 3) specified in a list of NIST-approved security functions.
Source(s):
NIST SP 800-102 under Approved

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either: 1) Specified in a FIPS or NIST Recommendation, 2) Adopted in a FIPS or NIST Recommendation, or 3) Specified in a list of NIST-approved security functions.
Source(s):
NIST SP 800-106 under Approved

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, 2) adopted in a FIPS or NIST Recommendation or 3) specified in a list of NIST-approved security functions.
Source(s):
NIST SP 800-107 Rev. 1 under Approved
NIST SP 800-135 Rev. 1 under Approved

  FIPS approved or NIST Recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation or 3) specified in a list of NIST Approved security functions.
Source(s):
NIST SP 800-108 under Approved

  is used to mean that an algorithm is specified in a FIPS or NIST Recommendation (published as a NIST Special Publication).
Source(s):
NIST SP 800-125B under Approved

  FIPS-approved and/or NIST-recommended.
Source(s):
NIST SP 800-133 [Superseded] under Approved
NIST SP 800-133 Rev. 2 under Approved

  FIPS-approved or NIST-Recommended.
Source(s):
NIST SP 800-90B under Approved

  FIPS approved or NIST recommended: an algorithm or technique that is either 1) specified in a FIPS or a NIST Recommendation, or 2) adopted in a FIPS or a NIST Recommendation.
Source(s):
NIST SP 800-38B under Approved
NIST SP 800-38D under Approved

  FIPS approved or NIST recommended: an algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation.
Source(s):
NIST SP 800-38C under Approved

  FIPS-approved or NIST-recommended: an algorithm or technique that is either 1) specified in a FIPS or a NIST Recommendation, or 2) adopted in a FIPS or a NIST Recommendation.
Source(s):
NIST SP 800-38F

  FIPS-approved or NIST-Recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation and specified either (a) in an appendix to the FIPS or NIST Recommendation, or (b) in a document referenced by the FIPS or NIST Recommendation.
Source(s):
NIST SP 800-56A Rev. 2 [Superseded] under Approved
NIST SP 800-56B Rev. 2 under Approved

  FIPS approved or NIST Recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation or 3) specified in a list of NIST-approved security functions.
Source(s):
NIST SP 800-56C [Superseded] under Approved

  FIPS-approved or NIST-recommended: an algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation.
Source(s):
NIST SP 800-67 Rev. 2 under Approved
NIST SP 800-67 Rev. 1 [Superseded] under Approved

  FIPS-Approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation and specified in an appendix to the FIPS or NIST Recommendation.
Source(s):
NIST SP 800-89 under Approved

  FIPS-approved, NIST-Recommended and/or validated by the Cryptographic Algorithm Validation Program (CAVP).
Source(s):
NIST SP 800-90A Rev. 1 under Approved

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) specified elsewhere and adopted by reference in a FIPS or NIST Recommendation.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Approved
NIST SP 800-57 Part 2 Rev.1 under Approved
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Approved

  FIPS-Approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation and specified either in an appendix to the FIPS or NIST Recommendation, or in a document referenced by the FIPS or NIST Recommendation.
Source(s):
NIST SP 800-57 Part 2 [Superseded] under Approved

  FIPS-Approved and/or NIST-recommended. An algorithm or technique that is either: 1) specified in a FIPS or NIST Recommendation or 2) specified elsewhere and adopted by reference in a FIPS or NIST Recommendation.
Source(s):
NIST SP 800-175B Rev. 1 under Approved

  FIPS-approved and/or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation or 2) specified elsewhere and adopted by reference in a FIPS or NIST Recommendation.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Approved

  FIPS-approved or NIST-recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation or 2) adopted in a FIPS or NIST Recommendation and specified either (a) in an appendix to the FIPS or NIST Recommendation or (b) in a document referenced by the FIPS or NIST Recommendation.
Source(s):
NIST SP 800-208

  FIPS approved or NIST recommended. An algorithm or technique that is either (1) specified in a FIPS or a NIST recommendation or (2) adopted in a FIPS or NIST recommendation.
Source(s):
FIPS 201 [version unknown] under Approved

  Federal Information Processing Standards (FIPS)-approved or NIST-recommended. An algorithm or technique that meets at least one of the following: 1) is specified in a FIPS or NIST Recommendation, 2) is adopted in a FIPS or NIST Recommendation or 3) is specified in a list of NIST-approved security functions (e.g., specified as approved in the annexes of [FIPS 140]).
Source(s):
NIST SP 800-56B Rev. 1 [Superseded] under Approved

  Federal Information Processing Standard (FIPS) approved or NIST recommended. An algorithm or technique that is either 1) specified in a FIPS or NIST Recommendation, or 2) adopted in a FIPS or NIST Recommendation.
Source(s):
NIST SP 800-63-2 [Superseded] under Approved