Skip to main content

Supported PKI Key Types and Signature Algorithms

Device Trust Manager various cryptographic key types and signature algorithms for certificate issuance. This article details the supported key types and their corresponding signature algorithms.

Supported Key Types

Device Trust Manager supports the following key types:

RSA (Rivest-Shamir-Adleman)

RSA is one of the most widely used asymmetric cryptographic algorithms, offering strong security and broad compatibility. It is commonly used in TLS certificates, code signing, and secure email.

Supported RSA key sizes:

  • RSA 1024

  • RSA 2048

  • RSA 3072

  • RSA 4096

ECDSA (Elliptic Curve Digital Signature Algorithm)

ECDSA is a cryptographic algorithm that offers robust security while utilizing smaller key sizes than RSA. This makes it particularly efficient and suitable for use in embedded systems and mobile devices.

Supported ECDSA key sizes:

  • ECDSA P256

  • ECDSA P384

  • ECDSA P521

Edwards Curve (Ed25519)

Ed25519 is an elliptic curve algorithm designed for high-performance and high-security digital signatures. It is widely used in modern cryptographic applications for its speed and resilience against side-channel attacks.

The supported key type is ED25519

ML-DSA (Multi-Layer Digital Signature Algorithm)

ML-DSA is a post-quantum cryptographic algorithm designed to resist attacks from quantum computers while providing strong security assurances.

Supported ML-DSA key sizes:

  • MLDSA-44

  • MLDSA-65

  • MLDSA-87

Supported Signature Algorithms

Device Trust Manager supports the following signature algorithms for certificates:

1. Signature Algorithms for Certificates

Signature Algorithm

Description

sha1WithRSA

RSA signature using SHA-1 (deprecated due to security vulnerabilities)

sha256WithRSA

RSA signature using SHA-256

sha384WithRSA

RSA signature using SHA-384

sha512WithRSA

RSA signature using SHA-512

sha256WithECDSA

ECDSA signature using SHA-256

sha384WithECDSA

ECDSA signature using SHA-384

sha512WithECDSA

ECDSA signature using SHA-512

sha3_256WithRSA

RSA signature using SHA3-256

sha3_384WithRSA

RSA signature using SHA3-384

sha3_512WithRSA

RSA signature using SHA3-512

pureEd25519

Ed25519 signature using a pure implementation

hashedEd25519

Ed25519 signature using a hashed approach

MLDSA-44

ML-DSA signature using the MLDSA-44 parameter set

MLDSA-65

ML-DSA signature using the MLDSA-65 parameter set

MLDSA-87

ML-DSA signature using the MLDSA-87 parameter set


참고

  • SHA-1-based algorithms (sha1WithRSA) are not recommended due to known security weaknesses.

  • Post-quantum algorithms such as ML-DSA provide long-term resistance against quantum computing threats.

Publication date: