NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage
Search CSRC:
Computer Security Division Documents Guide Click Here to download the "Guide to NIST Information Security Documents."

Updated: August 2009
Posted: December 2009

*NOTE: Categories in the Families, Topic Clusters, and Legal Requirements listings are from the "Guide to NIST Information Security Documents."

federal information processing standards (FIPS) Publications

FIPS Publications are issued by NIST after approval by the Secretary of Commerce pursuant to Section 5131 of the Information Technology Reform Act of 1996 (Public Law 104-106) and the Federal Information Security Management Act of 2002 (Public Law 107-347).

With the passage of the Federal Information Security Management Act of 2002, there is no longer a statutory provision to allow for agencies to waive mandatory Federal Information Processing Standards (FIPS). Therefore, the references to the "waiver process" contained in many of the FIPS are no longer applicable.

[For newer publications, links to "dx.doi.org" will redirect to another NIST website.]

FIPS
NumberDateTitle
FIPS 201--2Jul 9, 2012DRAFT Personal Identity Verification (PIV) of Federal Employees and Contractors (REVISED DRAFT)
draft_nist-fips-201-2_revised.pdf
comment-template_draft-nist-fips201-2_revised.xls
draft-nist-fips-201-2-revised_track-changes.pdf
draft-fips-201-2_comments_disposition-for-2011-draft.pdf
FIPS 201--1Mar 2006Personal Identity Verification (PIV) of Federal Employees and Contractors
(*including Change Notice 1 of June 23, 2006*)
FIPS-201-1-chng1.pdf
FIPS 200Mar 2006Minimum Security Requirements for Federal Information and Information Systems
FIPS-200-final-march.pdf
FIPS 199Feb 2004Standards for Security Categorization of Federal Information and Information Systems
FIPS-PUB-199-final.pdf
FIPS 198--1Jul 2008 The Keyed-Hash Message Authentication Code (HMAC)
FIPS-198-1_final.pdf
FIPS 197Nov 2001Advanced Encryption Standard
fips-197.pdf
FIPS 196Feb 1997Entity Authentication Using Public Key Cryptography
fips196.pdf
FIPS 191Nov 1994Guideline for The Analysis of Local Area Network Security
fips191.pdf
FIPS 190Sep 1994Guideline for the Use of Advanced Authentication Technology Alternatives
fip190.txt
FIPS 188Sep 1994Standard Security Label for Information Transfer
fips188.pdf
FIPS 186--3 Proposed ChangeApril 10, 2012DRAFT Proposed Change Notice for Digital Signature Standard (DSS)
change-notice_fips-186-3.pdf
fips_186-3.pdf
FIPS 186--3Jun. 2009Digital Signature Standard (DSS)
fips_186-3.pdf
FIPS 185Feb 1994Escrowed Encryption Standard
fips185.txt
FIPS 181Oct 1993Automated Password Generator
fips181.txt
FIPS 180--4March 2012Secure Hash Standard (SHS)
fips-180-4.pdf
FIPS 140--3Dec. 11, 2009DRAFT Security Requirements for Cryptographic Modules (Revised Draft)
revised-draft-fips140-3_PDF-zip_document-annexA-to-annexG.zip
revised-fips140-3_comments-template.dot
FIPS 140--2May 2001Security Requirements for Cryptographic Modules
(*Includes Change Notices as of December 3, 2002*)
fips1402.pdf
fips1402annexa.pdf
fips1402annexb.pdf
fips1402annexc.pdf
fips1402annexd.pdf
FIPS 140--1Jan 1994FIPS 140-1: Security Requirements for Cryptographic Modules
fips1401.pdf
FIPS 113May 1985Computer Data Authentication (no electronic version available)
ordering-pubs.html
Back to Top