Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

This is an archive
(replace .gov by .rip)

Cryptographic Algorithm Validation Program

Algorithm Validation Lists

All questions regarding the implementation and/or use of any algorithm should first be directed to the appropriate VENDOR point of contact (listed for each entry).

NIST maintains record of validations performed under all cryptographic standard testing programs past and present. As new algorithm implementations are validated by NIST and CSEC they are added to the appropriate algorithm validation list.

Validations for retired algorithms may be found in the lists below.


* Large list that may load slowly
 

What is the relationship of Algorithm Validation to FIPS 140-2 Module Validation?

A cryptographic module validated to FIPS 140-2 shall implement at least one Approved security function used in an Approved mode of operation. For an algorithm implementation to be listed on a cryptographic module validation certificate as an Approved security function, the algorithm implementation must meet all the requirements of FIPS 140-2 and must successfully complete the cryptographic algorithm validation process. A product or implementation does not meet the FIPS 140-2 applicability requirements by simply implementing an Approved security function and acquiring validations for each of the implemented algorithms. For more information, see the Cryptographic Module Validation Program

Created October 05, 2016, Updated October 03, 2018