An Engineer’s Guide to Signature Algorithms and EdDSA

An Engineer’s Guide to Signature Algorithms and EdDSA

A Zero-Trust Architecture is a token based architecture. The security of a token based architecture is as strong as its tokens. In the end, the security of a token depends on the signature or, more specifically, the algorithm used to generate the signature. The choice of a signature algorithm and its parameters makes up a significant part of the security of a token-based system. This webinar aims to bring some light to the confusion concerning common signature algorithms.

During the webinar, we will:

  • Explain the basics and characteristics of three public key signature algorithms:
    • RSA
    • Elliptic Curves Digital Signature Algorithm (ECDSA)
    • Edwards-curve Digital Signature Algorithm (EdDSA)
  • Discuss EdDSA in detail and outline why it is the best choice

Presented by:

Judith Kahrer

Judith Kahrer

Product Marketing Engineer at Curity

Daniel Lindau

Daniel Lindau

Identity Specialist & Solution Architect
X IconFollow

Mark Dobrinic

Mark Dobrinic

Software Engineer and Identity Specialist

Next steps

Start Today

Ready to modernize IAM? Build security and improve ease of use to stay ahead of the competition.