In September 2017, this (legacy) site will be replaced with the new site you can see at beta.csrc.nist.rip. At that time, links to this legacy site will be automatically redirected to apporpriate links on the new site.
The following is a list of algorithms with example values for each algorithm. This list may not always accurately reflect all Approved* algorithms. Please refer to the actual algorithm specification pages for the most accurate list of algorithms. Links for each cryptographic primative are provided below, or go directly to the CryptoToolkit Home Page.
FIPS 197 - Advanced Encryption Standard (AES)
SP 800-67 - Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
FIPS 185 - Escrowed Encryption Standard containing the Skipjack algorithm
Visit the Block Cipher Modes Page
SP 800-38A - Recommendation for Block Cipher Modes of Operation: Methods and Techniques
SP 800-38B - Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
SP 800-38C - Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality
SP 800-38D - Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
SP 800-38F - Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping
SP 800-38G -Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption
Visit the Digital Signatures Page
FIPS 186-4 - Digital Signature Standard
FIPS 180-2 - Secure Hash Standard
FIPS 202 - SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions
Input Message Length | ||||||
0-bit | 5-bit | 30-bit | 1600-bit | 1605-bit | 1630-bit | |
SHA3-224 | file | file | file | file | file | file |
SHA3-256 | file | file | file | file | file | file |
SHA3-384 | file | file | file | file | file | file |
SHA3-512 | file | file | file | file | file | file |
SHAKE128 | file | file | file | file | file | file |
SHAKE256 | file | file | file | file | file | file |
SP 800-185 - SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash
SP 800-56A - Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logorithm Cryptography
Visit the Random Number Generation Page
Deterministic Generators
Visit the Message Authentication Page
FIPS 198 - The Keyed-Hash Message Authentication Code (HMAC)