MCP and AI Agents: Identity Strategies for Safe API Access - Register for webinar! Register
An Engineer’s Guide to Signature Algorithms and EdDSA

An Engineer’s Guide to Signature Algorithms and EdDSA

Sign In To Access The Webinar

A Zero-Trust Architecture is a token based architecture. The security of a token based architecture is as strong as its tokens. In the end, the security of a token depends on the signature or, more specifically, the algorithm used to generate the signature. The choice of a signature algorithm and its parameters makes up a significant part of the security of a token-based system. This webinar aims to bring some light to the confusion concerning common signature algorithms.

During the webinar, we will:

  • Explain the basics and characteristics of three public key signature algorithms:
    • RSA
    • Elliptic Curves Digital Signature Algorithm (ECDSA)
    • Edwards-curve Digital Signature Algorithm (EdDSA)
  • Discuss EdDSA in detail and outline why it is the best choice

Presented by:

Judith Kahrer

Judith Kahrer

Product Marketing Engineer at Curity

Daniel Lindau

Daniel Lindau

Identity Specialist & Solution Architect
X IconFollow

Mark Dobrinic

Mark Dobrinic

Software Engineer and Identity Specialist

Next steps

Ready for the Next Generation of IAM?

Build secure, flexible identity solutions that keep pace with innovation. Start today.