blog

Facilitating Adoption Through Cryptographic Standards

May 18, 2020
Hedera Team
Hedera
Hedera provides secure, scalable infrastructure for real-world decentralized applications in finance, AI, and sustainability, governed by global enterprises.

One of the most valuable ways in which people use Hedera is by building business or application networks. For example, the Coupon Bureau will be using Hedera to connect retailers, manufacturers, and consumers so that coupons can transact more easily, a process fraught by fraud today. AdsDax relies on Hedera to combat fraud and increase fairness in their advertising marketplace, for all parties involved. Connecting entities will continue to be an important way for applications to unlock value with Hedera, as they can take advantage of network effects.

Standards are integral to building business networks as they help ensure quality and adopting widely used standards reduces friction for others to join, further accelerating network effects. When it comes to security, which includes using digital signatures and other cryptography to protect communication among network participants, the US National Institute of Standards and Technology (NIST) sets the standards for all who wish to work with the US federal government. As a result, any DLT project that wants to be used by the US federal government — say, a central bank digital currency (CBDC) — or by a company that works with the federal government, will have to abide by the NIST security standards. In fact, adopting NIST standards is common industry practice worldwide.

At Hedera, we take care to ensure our cryptography complies with standards wherever possible. To that end, all cryptography we use complies with NIST standards; see the table below for a summary. Furthermore, our core network uses only algorithms from the stricter CNSA suite, which are those NIST standards and parameters deemed suitable by the National Security Agency to protect Top Secret information. In doing so, we maintain high security standards, while enabling future applications to adopt Hedera.

Algorithm

Parameter Selection

Use

NIST Standard

SHA-2

384 bit output

Hedera Network

FIPS 180-4

RSA digital signatures

3072 bit modulus

Hedera Network

FIPS 186-4

AES-GCM

256 bit key

Hedera Network*

FIPS 197 and SP 800-38D

ECDSA

384 bit key

Hedera Network*

FIPS 186-4

ECDH

384 bit key

Hedera Network*

SP 800-56A

Ed25519

256 bit key

Clients

FIPS 186-5 (Draft)

*Used as part of the TLS1.2 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384.

Back to Blog

discover

See more articles

January 14, 2026

HIP-1249: Enhanced smart contracts on Hedera with precise throttling

HIP-1249 introduces a fundamental shift in how Hedera throttles smart contract execution, replacing the conservative 15 million gas-per-second limit with a precise operations-per-second model that unlocks significantly more throughput. This
Read More
January 9, 2026

Quarterly Events Highlights | Q4 2025 (October – December)

Hedera closed out one of its busiest quarters in Q4 2025, building a strong global presence through 12 events across 10 cities worldwide. Across the quarter, Hedera used these moments
Read More
January 9, 2026

These are the Winners of the Hello Future Ascension Hackathon

The second installment of the Hello Future hackathon trilogy, the Ascension Hackathon, has come to a close! In November 2025, hackers from all around the world came together to build
Read More