An Engineer’s Guide to Signature Algorithms and EdDSA

Logo
Presented by

Judith Kahrer, Product Marketing Engineer, Daniel Lindau, Identity Specialist, Mark Dobrinic, Software Engineer, at Curity

About this talk

A Zero-Trust Architecture is a token based architecture. The security of a token based architecture is as strong as its tokens. In the end, the security of a token depends on the signature or, more specifically, the algorithm used to generate the signature. The choice of a signature algorithm and its parameters makes up a significant part of the security of a token-based system. This webinar aims to bring some light to the confusion concerning common signature algorithms. During the webinar, we will: - Explain the basics and characteristics of three public key signature algorithms; RSA, Elliptic Curves Digital Signature Algorithm (ECDSA), and Edwards-curve Digital Signature Algorithm (EdDSA) - Discuss EdDSA in detail and outline why it is the best choice
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (13)
Subscribers (634)
Curity is a leading provider of IAM and API security technology that enables user authentication and authorization for a wide range of digital services. The Curity Identity Server is highly scalable, and handles the complexities of the leading identity standards, making them easier to use, customize and deploy. Today, the Curity Identity Server is the most complete OAuth and OpenID Connect server, and we enjoy the trust of large organizations in most industries, including financial services, telecom, retail, gaming, energy, and government services across many countries.