All Algorithms
ECDH-P384
Quantum UnsafeKey Exchange algorithm
This algorithm will be broken by a cryptographically relevant quantum computer. Migration is recommended.
Algorithm Details
Category
Key Exchange
Quantum Safety
Quantum Unsafe
Key Lengths (bits)
384
FIPS Standard
SP 800-56A
Known Vulnerabilities
- Shor's algorithm (ECDLP)
Notes
Higher classical security but still Shor-vulnerable. Common in government and financial TLS configurations.
Discover which algorithms your organization is using.
Run Free Assessment