Public Key Algorithms

The list of preferred algorithms is provided to an authenticator when you are creating a credential, and an authenticator makes a best-effort to create the most preferred credential that it can.

There are several cryptographic algorithms for which a Relying Party might specify a preference. The following algorithms are currently supported in IBM Security Verify Access:

Description COSE Identifier
SHA256 with ECDSA -7
SHA384 with ECDSA -35
SHA512 with ECDSA -36
SHA1 with RSA -65535
SHA256 with RSA -257
SHA384 with RSA -258
SHA512 with RSA -259


Parent topic: Concepts