![An Engineer’s Guide to Signature Algorithms and EdDSA](https://images.ctfassets.net/tldhjvq55hjd/5pH7GeKwtlwlN6mMKTDofC/157b1202d2f0313325cac478e48c2976/curity-webinar-EdDSA_3.png?w=1200&h=563&q=70&fm=png&bg=white)
An Engineer’s Guide to Signature Algorithms and EdDSA
A Zero-Trust Architecture is a token based architecture. The security of a token based architecture is as strong as its tokens. In the end, the security of a token depends on the signature or, more specifically, the algorithm used to generate the signature. The choice of a signature algorithm and its parameters makes up a significant part of the security of a token-based system. This webinar aims to bring some light to the confusion concerning common signature algorithms.
During the webinar, we will:
- Explain the basics and characteristics of three public key signature algorithms:
- RSA
- Elliptic Curves Digital Signature Algorithm (ECDSA)
- Edwards-curve Digital Signature Algorithm (EdDSA)
- Discuss EdDSA in detail and outline why it is the best choice
Presented by:
![Judith Kahrer](http://images.ctfassets.net/tldhjvq55hjd/2s4IeSQ2OdqtOUSo1GrVLP/85a3661a70f4a840fef342da8644cb0f/Judith-Kahrer.png?fm=jpg&w=256&h=256)
Judith Kahrer
Product Marketing Engineer at Curity
![Daniel Lindau](http://images.ctfassets.net/tldhjvq55hjd/4Y3attBcEeXP5JpQDkVOrO/a5c0ea4a106b9a61a9909000fcf58db2/Headshot-Daniel.jpg?fm=jpg&w=256&h=256)
Daniel Lindau
Identity Specialist & Solution Architect
Follow
![Mark Dobrinic](http://images.ctfassets.net/tldhjvq55hjd/1tSGp4avktNKSx1CVLOH7q/26e5122815b7200d647f6ab5df7dceb6/1517687201165.jpeg?fm=jpg&w=256&h=256)
Mark Dobrinic
Software Engineer and Identity Specialist
Next steps
Ready to modernize IAM?
Start Today - Build security and improve ease of use to stay ahead of the competition.