CKM_SHA3_384_EDDSA
Supported Operations
Encrypt and Decrypt | No |
Sign and Verify | Yes |
SignRecover and VerifyRecover | No |
Digest | No |
Generate Key/Key-Pair | No |
Wrap and Unwrap | No |
Derive | No |
Available in FIPS Mode | No |
Key Size Range (bits) and Parameters
Minimum | 64 |
Maximum | 571 |
Parameter | None |
Description
This mechanism uses the Secure Hash Algorithm-3 (SHA-3) standard, as described in NIST publication FIPS PUB 202.
Return to ProtectToolkit-C Mechanisms