What ciphers are FIPS 140-2 compliant?

What ciphers are FIPS 140-2 compliant?

Advanced Encryption Standard (AES)

  • Triple-DES Encryption Algorithm (TDEA)
  • Secure Hash Standard (SHS) (SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224.
  • SHA-3 Extendable-Output Functions (XOF) (SHAKE128, SHAKE256)
  • SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash.
  • Triple-DES.
  • AES.
  • HMAC.
  • What are cryptographic modules?

    A cryptographic module is a hardware or software device or component that performs cryptographic operations securely within a physical or logical boundary, using a hardware, software or hybrid cryptographic engine contained within the boundary, and cryptographic keys that do not leave the boundary.

    What are FIPS validated cryptographic modules?

    FIPS 140-2 defines a cryptographic module as “the set of hardware, software, and/or firmware that implements approved security functions and is contained within the cryptographic boundary.”

    What is a FIPS cryptographic module?

    FIPS 140: “Security Requirements for Cryptographic Modules” The FIPS 140 standard is used in designing, implementing, and operating cryptographic modules. A cryptographic module is the set of hardware, software, and/or firmware that implements security functions, such as algorithms and key generation.

    What is an example of a cryptographic module?

    An example of a Security Level 1 cryptographic module is a personal computer (PC) encryption board. Security Level 1 allows the software and firmware components of a cryptographic module to be executed on a general purpose computing system using an unevaluated operating system.

    What is FIPS cryptography mode?

    FIPS 140 is a cryptographic security standard used by the federal government and others requiring higher degrees of security. Adobe utilizes certified and unmodified encryption modules licensed from RSA Security within desktop and server products.

    What is a FIPS 140-2 module?

    FIPS 140-2 is a NIST publication that lists security requirements for cryptographic modules protecting sensitive but unclassified information in computer and telecommunications systems.

    Is FIPS 140 2 NSA approved?

    The NIST’s FIPS publications, including FIPS 140-2, are approved by the U.S. Secretary of Commerce, so whether FIPS 140-2 is approved by the NSA is immaterial because there’s no official NSA approval process for FIPS publications.

    What cryptographic algorithm is used by the NSA?

    (AES)
    The encryption algorithm (AES)