Digital Signatures
Digital signatures rely on the use of public key cryptography, which generally allows users to communicate securely without having prior access to a shared secret key. Digital signatures can be used to ensure the authenticity of a sender. For example, Bob can encrypt a message with his private key and send it to Alice. If Alice can successfully decrypt it using the corresponding public key, this provides assurance to Alice that Bob (and no one else) sent it.
Supported algorithms
SHA1withRSA
SHA256withRSA
SHA384withRSA
SHA512withRSA
ECDSA
SHA1withECDSA
SHA256withECDSA
SHA384withECDSA
SHA512withECDSA
SHA1withRSAPSSPadding
SHA256withRSAPSSPadding
SHA384withRSAPSSPadding
SHA512withRSAPSSPadding
Note
The algorithms for verifying digital signature are supported in remote mode only.
Note
The SHA384withRSAPSSPadding algorithm is not supported with CipherTrust Manager.