Federal Information Processing Standards (FIPS) 140-2
To conform to the security requirements of FIPS 200, applications must use cryptographic modules certified by the Cryptographic Module Validation Program and compliant with FIPS 140-1 or 140-2.
The minimum requirements for the use of validated cryptography by applications are:
- All cryptographic operations, including key generation, must be performed by validated cryptographic modules.
- Only approved security functions are permitted.
- Only approved key establishment techniques are permitted.