NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage
Search CSRC:

Algorithm Validation

All questions regarding the implementation and/or use of any algorithm located on the following lists should first be directed to the appropriate VENDOR point of contact (listed for each entry). Thank you.

NIST maintains validation lists for all of its cryptographic standards testing programs (past and present). All of the following lists are updated as new algorithm implementations receive validation certificates from NIST and CSE.

What is the relationship of an algorithm validation to the FIPS 140-2 module validation?

A cryptographic module validated to FIPS 140-2 shall implement at least one Approved security function used in an Approved mode of operation. For an algorithm to be listed on a module validation certificate as an Approved security function, the algorithm implementation must meet all the requirements of FIPS 140-2 and must have received an algorithm validation certificate.

A product or implementation does not meet the FIPS 140-2 applicability requirements by simply implementing an Approved security function and acquiring algorithm validation certificates.

The following lists are provided for historical purposes only. The algorithms are either no longer recognized as Approved security functions or testing is no longer available from the Cryptographic Algorithm Validation Program.