InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

An Engineer’s Guide to Signature Algorithms and EdDSA

Presented by

Judith Kahrer, Product Marketing Engineer, Daniel Lindau, Identity Specialist, Mark Dobrinic, Software Engineer, at Curity

About this talk

A Zero-Trust Architecture is a token based architecture. The security of a token based architecture is as strong as its tokens. In the end, the security of a token depends on the signature or, more specifically, the algorithm used to generate the signature. The choice of a signature algorithm and its parameters makes up a significant part of the security of a token-based system. This webinar aims to bring some light to the confusion concerning common signature algorithms. During the webinar, we will: - Explain the basics and characteristics of three public key signature algorithms; RSA, Elliptic Curves Digital Signature Algorithm (ECDSA), and Edwards-curve Digital Signature Algorithm (EdDSA) - Discuss EdDSA in detail and outline why it is the best choice
Curity

Curity

674 subscribers13 talks
Protect Identities and Secure Digital Services
Curity is a leading provider of IAM and API security technology that enables user authentication and authorization for a wide range of digital services. The Curity Identity Server is highly scalable, and handles the complexities of the leading identity standards, making them easier to use, customize and deploy. Today, the Curity Identity Server is the most complete OAuth and OpenID Connect server, and we enjoy the trust of large organizations in most industries, including financial services, telecom, retail, gaming, energy, and government services across many countries.
Related topics