Coverage mapGLOBAL

FIPS Standards Hub What is included

A coverage map for FIPS standards and validation reality: algorithms, modules, and evidence.

Use this page to see which document to use for which question, and what evidence it tends to drive.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Sections
5

Structured answer sets in this page tree.

Primary sources
8

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

FIPS-compliant is a phrase that hides multiple different things: using approved algorithms, building a cryptographic module that meets FIPS 140-3 requirements, and achieving validation through the CMVP. This hub is organized to remove that confusion. Below is what is included, what it is for, and how the pieces fit together into a defensible evidence and procurement story.

Section 1

The two layers: algorithms versus module validation

Layer one is the algorithm layer. It includes AES, secure hash, digital signatures, and post-quantum primitives. These documents tell you what the primitive is and what algorithm-level requirements apply.

Layer two is the module layer. FIPS 140-3 defines security requirements for cryptographic modules, and the CMVP validates modules against those requirements through labs, test evidence, and Security Policies.

  • Algorithm layer: what the primitive is and how it is specified
  • Module layer: how crypto is packaged, exposed as services, tested, and evidenced
  • Procurement reality: buyers often ask for the module-validation story, not just an algorithm name
Section 2

Included: FIPS 140-3 and CMVP program reality

This hub includes FIPS 140-3, the CMVP program context, and the implementation-guidance layer that affects how real submissions are scoped and tested.

That means you can use the hub to understand boundary, approved mode, services, self-tests, and the supporting SP 800-140 family used in the CMVP ecosystem.

  • FIPS 140-3 for module requirements and levels
  • CMVP for validation flow and certificate meaning
  • Implementation Guidance and SP 800-140 references for application detail
Recommended next step

Use FIPS Standards Hub What is included as a cited research workflow

Research Copilot can take FIPS Standards Hub What is included from clarifying scope and applicability with cited answers to a reusable workflow inside Sorena. Teams working on FIPS Standards Hub can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Section 3

Included: the core FIPS crypto standards

The hub includes the FIPS crypto standards most commonly referenced in product security, validation, and procurement work.

Treat this as an implementation set: it helps you choose algorithms, set safe defaults, and create evidence-backed decisions.

  • FIPS 197 for AES
  • FIPS 180-4 and FIPS 202 for secure hash and XOF coverage
  • FIPS 186-5 for RSA, ECDSA, deterministic ECDSA, and EdDSA
  • FIPS 203, 204, and 205 for PQC key establishment and signatures
Section 5

How to use this hub as a workflow

This hub is designed as a workflow. If you follow it, you should end up with a crypto inventory, a list of allowed algorithms and parameters, an approved-mode story where relevant, and an evidence pack that makes audits and procurement responses predictable.

Use the comparison pages to reduce program confusion: FIPS versus NIST SP and FIPS versus Common Criteria.

  • Inventory where crypto is used and who owns it
  • Select allowed algorithms, parameters, and migration patterns
  • Build evidence tied to scope and versions
  • Decide whether you need algorithm conformance evidence, module validation, product evaluation, or both
Primary sources

References and citations

Related guides

Explore more topics