CKM_SHA3_224_EDDSA
Supported Operations
| Encrypt and Decrypt | No | 
| Sign and Verify | Yes | 
| SignRecover and VerifyRecover | No | 
| Digest | No | 
| Generate Key/Key-Pair | No | 
| Wrap and Unwrap | No | 
| Derive | No | 
| Available in FIPS Mode | No | 
Key Size Range (bits) and Parameters
| Minimum | 64 | 
| Maximum | 571 | 
| Parameter | None | 
Description
This mechanism uses the Secure Hash Algorithm-3 (SHA-3) standard, as described in NIST publication FIPS PUB 202.
Return to ProtectToolkit-C Mechanisms