An Engineer’s Guide to Signature Algorithms and EdDSA
A Zero-Trust Architecture is a token based architecture. The security of a token based architecture is as strong as its tokens. In the end, the security of a token depends on the signature or, more specifically, the algorithm used to generate the signature. The choice of a signature algorithm and its parameters makes up a significant part of the security of a token-based system. This webinar aims to bring some light to the confusion concerning common signature algorithms.
During the webinar, we will:
- Explain the basics and characteristics of three public key signature algorithms:
- RSA
- Elliptic Curves Digital Signature Algorithm (ECDSA)
- Edwards-curve Digital Signature Algorithm (EdDSA)
- Discuss EdDSA in detail and outline why it is the best choice
Presented by:
Judith Kahrer
Product Marketing Engineer at Curity
Daniel Lindau
Identity Specialist & Solution Architect
Follow
Mark Dobrinic
Software Engineer and Identity Specialist
Next steps
Start Today
Ready to modernize IAM? Build security and improve ease of use to stay ahead of the competition.