Cryptographic algorithms¶
The following algorithms MUST be supported:
Algorithm |
Operations |
References |
---|---|---|
RS256 |
Signature |
|
RS512 |
Signature |
|
RSA-OAEP |
Key Encryption |
|
RSA-OAEP-256 |
Key Encryption |
|
A128CBC-HS256 |
Content Encryption |
|
A256CBC-HS512 |
Content Encryption |
The following algorithms are RECOMMENDED to be supported:
Algorithm |
Operations |
References |
---|---|---|
ES256 |
Signature |
|
ES512 |
Signature |
|
PS256 |
Signature |
|
PS512 |
Signature |
|
ECDH-ES |
Key Encryption |
|
ECDH-ES+A128KW |
Key Encryption |
|
ECDH-ES+A256KW |
Key Encryption |
The following algorithms MUST NOT be supported:
Algorithm |
Operations |
References |
---|---|---|
none |
Signature |
|
RSA_1_5 |
Key Encryption |
|
HS256 |
Signature |
|
HS384 |
Signature |
|
HS512 |
Signature |
Warning
The length of the RSA keys MUST be equal to or greater than 2048 bits. A length of 4096 bits is RECOMMENDED.