Annexure A – Business Layer Security – End-to-End Encryption
PreviousAPI Design Strategy Best PracticesNextAnnexure B – Application Layer Security – JWS Signature
Last updated
Was this helpful?
Last updated
Was this helpful?
Key Exchange Algorithm
Elliptic Curve Diffie-Hellman (ECDH) [1]
Elliptic Curve Group
Curve25519 [2]
Message Hash function
SHA-256, HMAC-SHA256 [FIPS PUB 180-4] [3]
Generating the shared session key for encryption
SHA-256 [4], HKDF [5]
Encryption Algorithm
AES-128-GCM [6]
Generation of Random Number
Randomness Requirements for Security [RFC 4086] [7]
[1] [2] [3] [4] [5] [6] [7]