Q:Are there particular cryptographic algorithms or protocols that should be implemented in the ICT security product for Australian Government use?

Yes. All ICT security products implementing cryptography destined for use by Australian Government agencies must use ACSC-approved cryptographic algorithms and ACSC-approved cryptographic protocols. Further information is in the ISM.