An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Lily Chen, Dustin Moody, Andrew Regenscheid, Angela Robinson
This standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications
Hildegard Ferraiolo, Andrew Regenscheid, Salvatore Francomacaro, David Cooper, Ketan Mehta, Annie W. Sokol, David Temoshok, Gregory Fiumara, Justin Richer, James L. Fenton, Johnathan Gloster, nabil anwer
FIPS 201 establishes a standard for a Personal Identity Verification (PIV) system (Standard) that meets the control and security objectives of Homeland Security
The selective application of technological and related procedural safeguards is an important responsibility of every federal organization in providing adequate
This Standard specifies the Secure Hash Algorithm-3 (SHA-3) family of functions on binary data. Each of the SHA-3 functions is based on an instance of the
This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed
This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications
¿¿¿We have developed a new technology to reduce the cost of Braille-based information accessibility. Millions of blind and visually impaired people in the US
This Standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be
FIPS 200 is the second standard that was specified by the Federal Information Security Management Act (FISMA). It is an integral part of the risk management
William C. Barker, James F. Dray Jr., Ramaswamy Chandramouli, Teresa T. Schwarzhoff, William T. Polk, Donna F. Dodson, Ketan L. Mehta, S Gupta, William E. Burr, Timothy Grance
The purpose of this document is to provide a standard for categorizing federal information and information systems according to an agency's level of concern for
Morris J. Dworkin, Elaine B. Barker, James R. Nechvatal, James Foti, Lawrence E. Bassham, E. Roback, James F. Dray Jr.
The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a
This Federal Information Processing Standard (140-2) specifies the security requirements that will be satisfied by a cryptographic module, providing four
[Withdrawn October 19, 2015] This standard specifies two challenge-response protocols by which entities in a computer system may authenticate their identities
[Withdrawn October 19, 2015] This Guideline describes the primary alternative methods for verifying the identities of computer system users, and provides
[Withdrawn October 19, 2015] Information Transfer security labels convey information used by protocol entities to determine how to handle data communicated
[Withdrawn October 19, 2015] This standard specifies an encryption/decryption algorithm and a Law Enforcement Access Field (LEAF) creation method which may be