Docs Italia beta

Documenti pubblici, digitali.

4.5. Elenco degli algoritmi

Di seguito sono elencati gli algoritmi di criptazione individuati per la corretta implementazione dei profili di sicurezza.

4.5.3. Canonicalization

SIGLA URI
Canonical XML 1.0 http://www.w3.org/TR/2001/REC-xml-c14n-20010315
Canonical XML 1.1 http://www.w3.org/2006/12/xml-c14n11
Exclusive XML Canonicalization 1.0 Exclusive XML Canonicalization 1.0

4.5.4. Digest and signature public key REST

SIGLA ALGORITMI
HS256 HMAC using SHA-256 hash algorithm
HS384 HMAC using SHA-384 hash algorithm
HS512 HMAC using SHA-512 hash algorithm
RS256 RSA using SHA-256 hash algorithm
RS384 RSA using SHA-384 hash algorithm
RS512 RSA using SHA-512 hash algorithm
ES256 ECDSA using P-256 curve and SHA-256 hash algorithm
ES384 ECDSA using P-384 curve and SHA-384 hash algorithm
ES512 ECDSA using P-521 curve and SHA-512 hash algorithm

4.5.5. Digest REST

SIGLA ALGORITMI
S256 SHA-256 hash algorithm
S384 SHA-384 hash algorithm
S512 SHA-512 hash algorithm