Federal Information Processing Standards (FIPS) 140-2

To conform to the security requirements of FIPS 200, applications must use cryptographic modules certified by the Cryptographic Module Validation Program and compliant with FIPS 140-1 or 140-2.

The minimum requirements for the use of validated cryptography by applications are:
  • All cryptographic operations, including key generation, must be performed by validated cryptographic modules.
  • Only approved security functions are permitted.
  • Only approved key establishment techniques are permitted.