CKM_SHA3_384_EDDSA
Supported Operations
| Encrypt and Decrypt | No |
| Sign and Verify | Yes |
| SignRecover and VerifyRecover | No |
| Digest | No |
| Generate Key/Key-Pair | No |
| Wrap and Unwrap | No |
| Derive | No |
| Available in FIPS Mode | No |
Key Size Range (bits) and Parameters
| Minimum | 64 |
| Maximum | 571 |
| Parameter | None |
Description
This mechanism uses the Secure Hash Algorithm-3 (SHA-3) standard, as described in NIST publication FIPS PUB 202.
Return to ProtectToolkit-C Mechanisms