FAQGLOBAL

FIPS Crypto Algorithms FAQ

Common questions about adopting FIPS crypto standards in real products and protocols.

Focused on practical selection, interoperability, and evidence, not generic crypto summaries.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Questions
8

Structured answer sets in this page tree.

Primary sources
6

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

This FAQ is implementation guidance, not legal advice. Validate final decisions against NIST primary sources and the assurance scheme you are targeting.

Question 1

Do FIPS publications validate my implementation automatically?

No. FIPS publications define standards and algorithms. They do not automatically validate a product implementation.

In assurance contexts, the real question is whether you implement the algorithm correctly, constrain it safely, and can prove that with documentation, tests, and operational evidence.

Question 2

Does FIPS 197 tell me which AES mode to use?

No. FIPS 197 defines AES itself. The standard says AES shall be used with a FIPS-approved or NIST-recommended mode of operation.

That means the secure design choice is the whole bundle: AES plus mode plus IV or nonce rules plus key management plus error handling.

Question 3

What is the difference between FIPS 180-4 and FIPS 202?

FIPS 180-4 specifies the Secure Hash Standard and includes SHA-1 and the SHA-2 family. FIPS 202 specifies SHA-3 and the XOFs SHAKE128 and SHAKE256.

FIPS 202 explicitly says SHA-3 supplements FIPS 180-4 and that the two standards together provide resilience because they use fundamentally different design principles.

Question 4

Are SHAKE128 and SHAKE256 just hash functions?

No. In FIPS 202 they are approved XOFs, not approved hash functions in the general sense. Their approved uses are specified in NIST Special Publications.

That distinction matters because XOF output length is variable, which creates parameter and interoperability obligations that fixed-output hashes do not have.

Question 5

What changed in FIPS 186-5 compared with older DSS guidance?

FIPS 186-5 is broader and more modern. It covers RSA signatures through RFC 8017, specifies ECDSA, approves deterministic ECDSA, and approves EdDSA with additional requirements.

It also no longer approves DSA for new signature generation, although DSA may still be used to verify signatures generated before the new standard took effect.

Question 6

What do FIPS 203, 204, and 205 do?

FIPS 203 specifies ML-KEM for post-quantum key establishment. FIPS 204 specifies ML-DSA for post-quantum digital signatures. FIPS 205 specifies SLH-DSA for stateless hash-based digital signatures.

All three were published on 13 August 2024 and should be treated as part of a crypto-agility and migration program, not as isolated algorithm swaps.

Question 7

Do we need FIPS 140-3 to use FIPS algorithms?

No. You can implement FIPS algorithms without pursuing FIPS 140-3 module validation.

But if you do pursue FIPS 140-3, the algorithm choices have to line up with the module boundary, services mapping, approved mode behavior, self-tests, and documentation.

Question 8

What evidence should we retain as a minimum useful pack?

Keep enough evidence to answer four questions quickly: where crypto is used, which algorithms and parameters are allowed, how misuse is prevented, and how changes are controlled.

In practice that means a crypto inventory, configuration manifests, verification artifacts, key-management evidence, and change-control history.

Recommended next step

Use FIPS Crypto Algorithms FAQ as a cited research workflow

Research Copilot can take FIPS Crypto Algorithms FAQ from cited answers to recurring questions on this topic to a reusable workflow inside Sorena. Teams working on FIPS Crypto Algorithms can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Primary sources

References and citations

doi.org
Referenced sections
  • Primary post-quantum key-establishment reference.
Related guides

Explore more topics