About 3,570,000 results
Open links in new tab
  1. Cryptographic Module Validation Program | CSRC

    Oct 11, 2016 · The validated modules search provides access to the official validation information of all cryptographic modules that have been tested and validated under the Cryptographic …

  2. Validated FIPS 140-1 and FIPS 140-2 Cryptographic Modules

    Additionally, the descriptions may not necessarily reflect the capabilities of the modules when operated in the FIPS-Approved mode. The algorithms, protocols, and cryptographic functions …

  3. FIPS 140-2 Compliant Algorithms - Cryptography Stack Exchange

    Sep 21, 2012 · Is there any reference to check the list of encryption & signing algorithms which are compliant to FIPS 140-2. After an exhaustive search I could find only "AES".

  4. FIPS 140-2 - Wikipedia

    FIPS 140-2 defines four levels of security, simply named "Level 1" to "Level 4". It does not specify in detail what level of security is required by any particular application. Security Level 1 …

  5. System cryptography Use FIPS compliant algorithms for …

    Nov 16, 2018 · Enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing setting. Client devices that have this policy setting enabled can't …

  6. FIPS 140-2 Algorithm Lists and Certificate References for ... - Oracle

    This section lists the algorithms that can be used in FIPS 140-2 mode and the algorithms that should be avoided.

  7. Cryptographic Algorithm Validation Program | CSRC

    Oct 5, 2016 · The list of FIPS-approved algorithms can be found in SP 800-140C and SP 800-140D. Vendors may use any of the NVLAP-accredited Cryptographic and Security Testing …

  8. Algorithm Validation Lists - Cryptographic Algorithm Validation

    Validation lists (current and historical) identifying algorithm implementations successfully tested under NIST's Cryptographic Algorithm Validation Program (CAVP).

  9. FIPS Compliant Algorithms for Encryption, Hashing, and Signing

    Apr 8, 2024 · FIPS compliant signature algorithms, such as RSA (Rivest-Shamir-Adleman) and ECDSA (Elliptic Curve Digital Signature Algorithm), use cryptographic techniques to create …

  10. non-FIPS algorithms. It provides a comprehensive overview of setting up a FIPS-compliant environment, with detailed steps for configuring cryptographic providers i. ava, Go and Python. …