All Algorithms
ECDSA-P384
Quantum UnsafeDigital Signature algorithm
This algorithm will be broken by a cryptographically relevant quantum computer. Migration is recommended.
Algorithm Details
Category
Digital Signature
Quantum Safety
Quantum Unsafe
Key Lengths (bits)
384
FIPS Standard
FIPS 186-5
Known Vulnerabilities
- Shor's algorithm (ECDLP)
Notes
Higher classical security level but equally vulnerable to Shor's algorithm on the ECDLP.
Discover which algorithms your organization is using.
Run Free Assessment