
An Engineer’s Guide to Signature Algorithms and EdDSA
Sign In To Access The Webinar
A Zero-Trust Architecture is a token based architecture. The security of a token based architecture is as strong as its tokens. In the end, the security of a token depends on the signature or, more specifically, the algorithm used to generate the signature. The choice of a signature algorithm and its parameters makes up a significant part of the security of a token-based system. This webinar aims to bring some light to the confusion concerning common signature algorithms.
During the webinar, we will:
- Explain the basics and characteristics of three public key signature algorithms:
- RSA
- Elliptic Curves Digital Signature Algorithm (ECDSA)
- Edwards-curve Digital Signature Algorithm (EdDSA)
- Discuss EdDSA in detail and outline why it is the best choice
Presented by:

Judith Kahrer
Product Marketing Engineer at Curity

Daniel Lindau
Identity Specialist & Solution Architect
Follow

Mark Dobrinic
Software Engineer and Identity Specialist
Next steps
Ready to modernize IAM?
Start Today - Build security and improve ease of use to stay ahead of the competition.