In September 2017, this (legacy) site will be replaced with the new site you can see at beta.csrc.nist.rip. At that time, links to this legacy site will be automatically redirected to apporpriate links on the new site.
[12-12-13] - The transitioning of cryptographic algorithms and key lengths to stronger cryptographic keys and more robust algorithms as recommended in NIST SP800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths goes into effect January 1, 2014. Please see NIST SP800-131A, CMVP Implementation Guidance (IG) G.14 Validation of Transitioning Cryptographic Algorithms and Key Lengths, and IG G.15 Validating the Transition from FIPS 186-2 to FIPS 186-3 for details on the changes that take effect on January 1, 2014.
[09-05-13] - On July 19,2013, NIST announced the approval of Federal Information Processing Standard (FIPS) 186-4, the Digital Signature Standard. All of the changes between FIPS 186-3 and FIPS186-4 had already been incorporated into the CAVP testing tool; the testing of FIPS186-3 implementations is identical to the testing of FIPS 186-4 implementations. There is no need for a transition period in which both FIPS 186-3 and FIPS 186-4 validation would be performed. Previous CAVP validations for FIPS 186-3 will be considered as equivalent to those for FIPS 186-4. Vendors should start using FIPS 186-4 immediately.
[09-06-12] - GMAC implementation error reported by 3rd party in Open SSL FIPS Object Module (Cert. #1747) Version 2.0 (AES Cert. #1884) and Version 2.0.1 (AES Cert. #2116)
The CAVP and CMVP recently received 3rd party information that revealed an error in the GMAC implementation in the Open SSL FIPS Object Module (Cert. #1747) Version 2.0 (AES Cert. #1884) and Version 2.0.1 (AES Cert. #2116). This error occurs when the GCM implementation is tested with zero-length plaintext and Additional Authenticated Data (AAD) input lengths that are not a multiple of 128 bits. This means that the AAD information might not be signed correctly. The Open SSL FIPS Object Module is an open source distributed module that is used by other developers and may be found in many products. Therefore, the CAVP/CMVP is concerned that this error may be present in many of these other implementations or products. If you have any questions concerning these implementations, please contact the vendor. CMVP records indicate that the following validated modules are based on or utilize the Open SSL FIPS Object Module (Cert. #1747) and may also be at risk: Catbird vSecurity Crypto Module v1.0 (Cert. #1760) and the Cummings Engineering's Secure Mobility Suite B Crypto Module v1.0 (Cert. #1759).
[04-23-2012] - Validation of Transitioning Cryptographic Algorithms and Key Lengths
The Implementation Guidance for FIPS 140-2 and the CMVP (CMVP = Cryptographic Module Validation Program) has been updated to include IG G.14 which addresses how the validation of cryptographic algorithms by the CAVP and the validation of cryptographic modules by the CMVP will be affected during the transition as specified in Special Publication 800-131A. This transition guidance was originally drafted as SP 800-131B but has been moved to the CMVP Implementation Guidance IG G.14.
[04-23-2012] - Validating the Transition from FIPS 186-2 to FIPS 186-3
The Implementation Guidance for FIPS 140-2 and the CMVP (CMVP = Cryptographic Module Validation Program) has been updated to include IG G.15 which addresses the transition plan specific to the validation of FIPS 186-2 and FIPS 186-3. This transition plan addresses both the cryptographic algorithm validations and the cryptographic module validations that are conducted by the CAVP and CMVP, respectively. This transition guidance was originally drafted as SP 800-131C but has been moved to the CMVP Implementation Guidance IG G.15.
[08-17-2009] - Comments received on White Paper: The Transitioning of Cryptographic Algorithms and Key Sizes
Updated comments as of August 14, 2009.
[07-02-2009] -- White Paper: The Transitioning of Cryptographic Algorithms and Key Sizes
Comments are requested on the white paper "The Transitioning of Cryptographic Algorithms and Key Sizes" by August 3, 2009. Please provide comments to CryptoTransitions@nist.gov.
Comments received as of July 24, 2009.
[02-08-2008] Communications Security Establishment (CSE) recently changed name
The names "Communications Security Establishment" and the "Communications Security Establishment of the Government of Canada" have been replaced by Communication Security Establishment Canada. Furthermore, the acronym CSE has been replaced by CSEC. The email addresses remain unchanged.
[05-21-2007] DES Transition Plan and SP 800-57 Transition Plan has ended on May 19, 2007.
The Cryptographic Module Validation Program (CMVP) DES Transition Plan addresses the use of single key DES by Federal agencies, which are incorporated in cryptographic modules, validated to FIPS 140-1 or FIPS 140-2. Single key DES has been an Approved security function since the inception of the CMVP and the signing of FIPS 140-1 on January 11, 1994. The DES transition plan was developed to allow Federal agencies and vendors to smoothly transition to the stronger Approved security functions, specifically AES and Triple-DES.
The Cryptographic Module Validation Program (CMVP) NIST Special Publication (SP) 800-57 Transition Plan addresses the use of a minimum of 80 bits of security strength used by Federal agencies, as incorporated in cryptographic modules validated to FIPS 140-1 or FIPS 140-2. The SP 800-57 transition plan was developed to allow Federal agencies and vendors to smoothly transition to the use of a minimum of 80 bits of security strength.
CMVP Actions:
CAVP Actions:
Please contact the NIST Security Technology Group for additional information regarding the transition. William Polk 301-975-3348.
[03-06-2006] SP 800-57 Transition Plan
The Cryptographic Module Validation Program (CMVP) NIST Special Publication (SP) 800-57 Transition Plan addresses the use of a minimum of 80 bits of security strength used by Federal agencies, as incorporated in cryptographic modules validated to FIPS 140-1 or FIPS 140-2. The SP 800-57 transition plan was developed to allow Federal agencies and vendors to smoothly transition to the use of a minimum of 80 bits of security strength.
[05-19-2005] DES Transition Plan
The Cryptographic Module Validation Program (CMVP) DES Transition Plan addresses the use of single key DES by Federal agencies, which are incorporated in cryptographic modules, validated to FIPS 140-1 or FIPS 140-2. Single key DES has been an Approved security function since the inception of the CMVP and the signing of FIPS 140-1 on January 11, 1994. The DES transition plan was developed to allow Federal agencies and vendors to smoothly transition to the stronger Approved security functions, specifically AES and Triple-DES.
[02-09-2005] DES Testing and Algorithm Validation
The CMT laboratories shall no longer accept DES algorithm implementations for validation by the CAVP. As of today, February 9, 2005, the CAVP will no longer issue algorithm certificates for DES algorithm implementations not under contract for testing by the CMT laboratories at the time of receipt of this notice.