You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: guides/asymmetric_cryptography_signers.md
+21-27Lines changed: 21 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,28 +15,22 @@ It is common to divide cryptography in three categories:
15
15
16
16
In the [JWA](https://tools.ietf.org/html/rfc7518#section-3) specification we have algorithms that use both symmetric and asymmetric cryptography functions. Let's see them (taken from the specification):
| RS256 | RSASSA-PKCS1-v1_5 using SHA-256 | Recommended |
24
+
| RS384 | RSASSA-PKCS1-v1_5 using SHA-384 | Optional |
25
+
| RS512 | RSASSA-PKCS1-v1_5 using SHA-512 | Optional |
26
+
| ES256 | ECDSA using P-256 and SHA-256 | Recommended+ |
27
+
| ES384 | ECDSA using P-384 and SHA-384 | Optional |
28
+
| ES512 | ECDSA using P-521 and SHA-512 | Optional |
29
+
| PS256 | RSASSA-PSS using SHA-256 and MGF1 with SHA-256 | Optional |
30
+
| PS384 | RSASSA-PSS using SHA-384 and MGF1 with SHA-384 | Optional |
31
+
| PS512 | RSASSA-PSS using SHA-512 and MGF1 with SHA-512 | Optional |
32
+
33
+
(removed the none algorithm we don't support\*\*)
40
34
41
35
Besides the HSxxx family of algorithms, all others use asymmetric cryptography.
42
36
@@ -69,7 +63,7 @@ Let's see some examples on parsing asymmetric RSA keys with Joken:
69
63
70
64
This algorithm uses the RSASSA-PKCS1-v1_5 that uses SHA2 hash algorithms. The base for this algorithm is the RSA public key standard. So, to use this algorithm we need a pair of RSA keys. There are many ways to generate these keys in different environments and is outside the scope of this library. Here is one of these ways just for an example:
0 commit comments