U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Cryptographic algorithm

Definition(s):

  1. A well-defined computational procedure that takes variable inputs, including a cryptographic key, and produces an output.
Source(s):
CNSSI 4009-2015 under cryptographic algorithm (crypto-algorithm) from NIST SP 800-57 Part 1 Rev. 3

  2. Well-defined procedure or sequence of rules or steps, or a series of mathematical equations used to describe cryptographic processes such as encryption/decryption, key generation, authentication, signatures, etc.
Source(s):
CNSSI 4009-2015 under cryptographic algorithm (crypto-algorithm) from NSA/CSS Manual Number 3-16 (COMSEC)

  A well-defined computational procedure that takes variable inputs, often including a cryptographic key, and produces an output.
Source(s):
NIST SP 800-152
NIST SP 800-133 [Superseded]
NIST SP 800-133 Rev.1 [Superseded]

  A well-defined computational procedure that takes variable inputs, including a cryptographic key, and produces an output.
Source(s):
NIST SP 1800-21B under Cryptographic Algorithm from CNSSI 4009-2015
NIST SP 800-57 Part 1 Rev. 5
NIST SP 800-57 Part 1 Rev. 3 [Superseded]
NIST SP 800-57 Part 1 Rev. 4 [Superseded]

  A well-defined computational procedure that takes variable inputs, including a cryptographic key (if applicable), and produces an output.
Source(s):
NIST SP 800-175B Rev. 1

  A well-defined computational procedure that takes variable inputs (often including a cryptographic key) and produces an output.
Source(s):
NIST SP 800-133 Rev. 2