Contact

Encryption Authority serves professionals, researchers, and organizations operating within the encryption and cryptographic services sector across the United States. This page documents the available communication channels for this provider network, clarifies the geographic scope of service coverage, and specifies what information should accompany any inquiry to ensure accurate and timely handling. Inquiries related to providers, classification, and regulatory reference are all addressed through the channels described below.


Additional contact options

Beyond direct written correspondence, Encryption Authority maintains structured intake through the parent network at nationalcyberauthority.com, which coordinates reference coverage across affiliated cybersecurity properties. Inquiries that fall outside the scope of the encryption service sector — including questions about adjacent cybersecurity disciplines such as identity and access management, endpoint protection, or incident response — are better routed through that network hub.

Professionals seeking provider network placement or corrections to existing providers should reference the Encryption Providers section before submitting contact inquiries. Provider-related submissions require a distinct set of details covered in the section below.

Researchers and compliance professionals referencing specific regulatory frameworks — including NIST SP 800-175B Rev 1, HIPAA Security Rule provisions under 45 CFR § 164.312, or PCI DSS v4.0 published by the PCI Security Standards Council — are encouraged to cite the specific standard or provision in any inquiry to ensure routing to the appropriate reference category.


How to reach this office

All correspondence directed to Encryption Authority is handled through written channels. The provider network operates without a public telephone line; written communication produces a documentable record consistent with the reference function of this property.

Inquiries are categorized into 4 primary types at point of intake:

  1. Provider inquiries — Requests to add, modify, or remove a service provider entry within the Encryption Providers index.
  2. Regulatory reference questions — Questions about how a specific cryptographic standard, federal statute, or sector compliance requirement is described or classified on this provider network.
  3. Editorial and factual corrections — Notifications of outdated, inaccurate, or incomplete information appearing on any page within this property.
  4. Research and institutional inquiries — Requests from academic institutions, government agencies, or standards bodies seeking to understand how this provider network classifies encryption service categories.

Response timelines vary by inquiry type. Factual corrections receive priority handling given the compliance-critical nature of cryptographic reference information — errors in describing FIPS 140-3 validation status or NIST-approved algorithm families carry downstream consequences for professionals relying on this provider network.


Service area covered

Encryption Authority operates at national scope within the United States. The provider network covers encryption service providers, cryptographic solution vendors, and compliance-adjacent professional services operating under US regulatory jurisdiction, including obligations imposed by NIST, the Department of Health and Human Services (HHS) under HIPAA, the Federal Trade Commission, and sector-specific bodies such as the PCI Security Standards Council.

Geographic classification within this network distinguishes between 3 service tiers:

Inquiries from organizations outside US jurisdiction are acknowledged but fall outside the primary classification framework of this provider network. Cross-border cryptographic compliance questions involving export controls under EAR (Export Administration Regulations) administered by the Bureau of Industry and Security should be directed to that agency directly.


What to include in your message

Incomplete inquiries delay routing and response. The following breakdown specifies the minimum information required by inquiry type.

For provider inquiries:
- Legal business name and DBA (if applicable)
- Primary service category (e.g., symmetric encryption solutions, PKI management, HSM provisioning, cryptographic consulting)
- States of operation or national scope designation
- Relevant certifications or validations held (e.g., FIPS 140-3, SOC 2 Type II, Common Criteria)
- Contact name and verified business email address

For regulatory reference or editorial corrections:
- The specific page URL or section title where the issue appears
- The standard, statute, or agency publication at issue (e.g., NIST SP 800-111, PCI DSS v4.0 Requirement 3.5, HIPAA 45 CFR § 164.312(a)(2)(iv))
- A factual description of the discrepancy or question, with source citation where available

For research and institutional inquiries:
- Institutional affiliation
- The classification question or scope of research
- Whether the inquiry relates to provider network methodology, as described in How to Use This Encryption Resource, or to specific content

Messages lacking a subject category and a named regulatory or service reference are routed to a general queue and receive lower processing priority than categorized submissions. Correspondence containing confidential business data, personally identifiable information, or sensitive cryptographic material should not be transmitted through general contact channels.

Report a Data Error or Correction

Found incorrect information, an outdated fact, or a broken link? Use the form below.

References