About 14,600 results
Open links in new tab
  1. FIPS 140-2, Security Requirements for Cryptographic Modules | CSRC

    Dec 3, 2002 · This Federal Information Processing Standard (140-2) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended …

  2. FIPS 140-2 - Wikipedia

    Compliance In addition to using a valid cryptographic module, encryption solutions are required to use cipher suites with approved algorithms or security functions established by the FIPS 140-2 Annex A …

  3. FIPS-Approved Cryptography: A Look at Permitted Algorithms, …

    Dec 9, 2025 · FIPS-Approved Cryptography: A Look at Permitted Algorithms, Restricted Mechanisms, and Real-World Compliance Considerations Abstract Modern platforms rely on cryptographic …

  4. What Is FIPS? How Do You Become Compliant With FIPS?

    Sep 23, 2020 · What is FIPS 140-2? FIPS 140-2 is a standard which handles cryptographic modules and the ones that organizations use to encrypt data-at-rest and data-in-motion. To ensure …

  5. Federal Information Processing Standard (FIPS) Publication 140-2

    Dec 7, 2023 · The FIPS 140-2 security requirements cover 11 areas related to the design and implementation of a cryptographic module. The NIST Information Technology Laboratory operates a …

  6. Data Encryption Standards: AES, RSA, and FIPS Compliance

    From choosing between AES and RSA to navigating FIPS 140-3 and preparing for post-quantum threats, here’s what modern encryption compliance looks like.

  7. Encrypting Your Hard Drive with FIPS Compliant BitLocker on Windows

    Background "FIPS 140-2" is an encryption standard from the Federal Government that many IRBs require for storing sensitive data on a hard drive. Notably the California Health and Human Services …

  8. Federal Information Processing Standard (FIPS) 140-3

    The Federal Information Processing Standard (FIPS) Publication 140-3 is a US and Canadian government standard that specifies the security requirements for cryptographic modules that protect …

  9. FIPS Approved Ciphers and Algorithms - Palo Alto Networks

    6 days ago · Prisma SD-WAN FIPS Approved Ciphers and Algorithms Previous FIPS and FIPS-CC Security Next Prerequisites to FIPS-CC Mode ... FIPS and FIPS-CC modes supports the following …

  10. FIPS 140-2 explained: The engineer’s guide to compliance

    Aug 21, 2025 · What is FIPS 140-2? Think of FIPS 140-2 as the rulebook for encryption technology that the U.S. (and Canada) trusts. It’s the official federal information processing standard for checking …