
An Engineer’s Guide to Signature Algorithms and EdDSA
Sign In To Access The Webinar
A Zero-Trust Architecture is a token based architecture. The security of a token based architecture is as strong as its tokens. In the end, the security of a token depends on the signature or, more specifically, the algorithm used to generate the signature. The choice of a signature algorithm and its parameters makes up a significant part of the security of a token-based system. This webinar aims to bring some light to the confusion concerning common signature algorithms.
During the webinar, we will:
- Explain the basics and characteristics of three public key signature algorithms:
- RSA
- Elliptic Curves Digital Signature Algorithm (ECDSA)
- Edwards-curve Digital Signature Algorithm (EdDSA)
- Discuss EdDSA in detail and outline why it is the best choice
Presented by:

Judith Kahrer
Product Marketing Engineer at Curity

Daniel Lindau
Identity Specialist & Solution Architect
Follow

Mark Dobrinic
Software Engineer and Identity Specialist
Next steps
Ready for the Next Generation of IAM?
Build secure, flexible identity solutions that keep pace with innovation. Start today.