CKM_SHA3_512
This section provides a summary of CKM_SHA3_512.
Supported operations
| Operation | Supported |
|---|---|
| Encrypt and Decrypt | No |
| Sign and Verify | No |
| SignRecover and VerifyRecover | No |
| Digest | Yes |
| Generate Key/Key-Pair | No |
| Wrap and Unwrap | No |
| Derive | No |
FIPS Mode support
| Available in FIPS Mode | Restrictions in FIPS Mode |
|---|---|
| Yes | None |
Key Size Range and Parameters
| Key size minimum/maximum | Value |
|---|---|
| Minimum | 0 |
| FIPS Minimum | 0 |
| Maximum | None |
Parameter
None
Mechanism description
For a full description of this mechanism, refer to the SHA-3 documentation from OASIS (https://www.oasis-open.org).
This mechanism uses the Secure Hash Algorithm-3 (SHA-3) standard, as described in NIST publication FIPS PUB 202.
Return to ProtectToolkit-C mechanisms.