CKM_SHA3_224
Supported Operations
| Encrypt and Decrypt | No | 
| Sign and Verify | No | 
| SignRecover and VerifyRecover | No | 
| Digest | Yes | 
| Generate Key/Key-Pair | No | 
| Wrap and Unwrap | No | 
| Derive | No | 
| Available in FIPS Mode | Yes | 
| Restrictions in FIPS Mode | None | 
Key Size Range and Parameters
| Minimum | 0 | 
| FIPS Minimum | 0 | 
| Maximum | None | 
| Parameter | None | 
Description
For a full description of this mechanism, refer to the SHA-3 documentation from OASIS (https://www.oasis-open.org).
This mechanism uses the Secure Hash Algorithm-3 (SHA-3) standard, as described in NIST publication FIPS PUB 202.
Return to ProtectToolkit-C Mechanisms