All Algorithms
SHA-3-384
Conditionally SafeHash Function algorithm
This algorithm is safe with sufficient key/output size. Grover's algorithm halves the effective security level.
Algorithm Details
Category
Hash Function
Quantum Safety
Conditionally Safe
Key Lengths (bits)
384
FIPS Standard
FIPS 202
Known Vulnerabilities
- Grover's algorithm (collision resistance ~128-bit, preimage ~192-bit)
Notes
SHA-3 at 384-bit output. Strong quantum resilience and algorithm diversity from SHA-2.
Discover which algorithms your organization is using.
Run Free Assessment