All Algorithms

SHA-3-384

Conditionally Safe

Hash Function algorithm

This algorithm is safe with sufficient key/output size. Grover's algorithm halves the effective security level.

Algorithm Details

Category

Hash Function

Quantum Safety

Conditionally Safe

Key Lengths (bits)

384

FIPS Standard

FIPS 202

Known Vulnerabilities

  • Grover's algorithm (collision resistance ~128-bit, preimage ~192-bit)

Notes

SHA-3 at 384-bit output. Strong quantum resilience and algorithm diversity from SHA-2.

Discover which algorithms your organization is using.

Run Free Assessment
NetflixOracleFigmaCoinbaseDellServiceNowAppleDeloitteNikeAWSJPMorgan ChaseT-MobileAtlassianBoschStripeL'OrealDatadogMicrosoftPalantirHPRobinhoodEYSonyCanvaVisaAutoCADDiscordBellAdobeCharles SchwabE*TRADENVIDIAGoogleJohnson & JohnsonFidelityClaudeMastercardIntuitBoeingAT&TShopifyPwCOpenAIKPMGIBMDatabricksSalesforceGitHubAmerican ExpressWorkday