CKM_SHA3_512
This section provides a summary of CKM_SHA3_512.
Supported operations
Operation | Supported |
---|---|
Encrypt and Decrypt | No |
Sign and Verify | No |
SignRecover and VerifyRecover | No |
Digest | Yes |
Generate Key/Key-Pair | No |
Wrap and Unwrap | No |
Derive | No |
FIPS Mode support
Available in FIPS Mode | Restrictions in FIPS Mode |
---|---|
Yes | None |
Key Size Range and Parameters
Key size minimum/maximum | Value |
---|---|
Minimum | 0 |
FIPS Minimum | 0 |
Maximum | None |
Parameter
None
Mechanism description
For a full description of this mechanism, refer to the SHA-3 documentation from OASIS (https://www.oasis-open.org).
This mechanism uses the Secure Hash Algorithm-3 (SHA-3) standard, as described in NIST publication FIPS PUB 202.
Return to ProtectToolkit-C mechanisms.