An Engineer’s Guide to Signature Algorithms and EdDSA

An Engineer’s Guide to Signature Algorithms and EdDSA

A Zero-Trust Architecture is a token based architecture. The security of a token based architecture is as strong as its tokens. In the end, the security of a token depends on the signature or, more specifically, the algorithm used to generate the signature. The choice of a signature algorithm and its parameters makes up a significant part of the security of a token-based system. This webinar aims to bring some light to the confusion concerning common signature algorithms.

During the webinar, we will:

  • Explain the basics and characteristics of three public key signature algorithms:
    • RSA
    • Elliptic Curves Digital Signature Algorithm (ECDSA)
    • Edwards-curve Digital Signature Algorithm (EdDSA)
  • Discuss EdDSA in detail and outline why it is the best choice

Presented by:

Judith Kahrer

Judith Kahrer

Product Marketing Engineer at Curity

Daniel Lindau

Daniel Lindau

Identity Specialist & Solution Architect
X IconFollow

Mark Dobrinic

Mark Dobrinic

Software Engineer and Identity Specialist

Next steps

Ready to modernize IAM?

Start Today - Build security and improve ease of use to stay ahead of the competition.