NIST maintains validation lists for all of its cryptographic standards testing programs (past and present). All of the following lists are updated as new algorithm implementations receive validation certificates from NIST and CSE.
A cryptographic module validated to FIPS 140-2 shall implement at least one Approved security function used in an Approved mode of operation. For an algorithm to be listed on a module validation certificate as an Approved security function, the algorithm implementation must meet all the requirements of FIPS 140-2 and must have received an algorithm validation certificate.
A product or implementation does not meet the FIPS 140-2 applicability requirements by simply implementing an Approved security function and acquiring algorithm validation certificates.
The following lists are provided for historical purposes only. The algorithms are either no longer recognized as Approved security functions or testing is no longer available from the Cryptographic Algorithm Validation Program.