VULNERABILITY ANALYSES OF THE JSON WEB TOKEN DIGITAL SIGNATURE ALGORITHM

Abstract

The article describes the existing methods of digital signature data technology Json Web Token, analyzes the mechanisms and algorithms for their work. The vulnerabilities of existing digital signature methods are described, as well as ways to protect and level out the possible harm caused by these vulnerabilities. Examples of the most frequently used methods by hackers to crack and grab confidential information using the following shortcomings.

Authors and Affiliations

Р. О. Стахов

Keywords

Related Articles

DEVELOPMENT OF THE THEORY AND MEANS OF INTEGRATED HYDRAULIC SPRAYING AND COOLING OF MUNICIPAL AIR

The paper presents a new solution to the actual scientific problem, which is to improve the working conditions of miners by dust and temperature factors by developing a theory of hydrodynamic dust removal based on pulsed...

COMBINING THE INGREDIENTS OF FROZEN FRUIT AND BERRY MIXTURES ACCORDING TO THE PRINCIPLES OF FOOD COMBINATORICS

This article represents theoretical and practical results of combining the fruit and berry mixture for production of frozen half-products with radioprotectory action. Safety, quality and effectiveness of a future product...

THE FEASIBILITY STUDY OF USING METHOD FP-GROWTH (FPG) DURING THE SOFTWARE DEVELOPMENT

In the paper a comparative analysis of the methods of frequent object sets generation for the associative rules search is performed. The expediency of using the FP-Growth (FPG) method for searching associative rules in s...

UKRAINIAN CUISINE IN THE CONTEXT OF MODERN NUTRITION

The article presents research data on the development of new technology dumplings of high biological value. To improve the biological value of buckwheat flour added and rye bran. Based on the results obtained, a new reci...

IMPROVING THE METHOD OF RECEIVING THE PURPOSE OF THE N-GaAs DEPOSITS

The method of obtaining a porous layer on the n-GaAs substrates is proposed, which differs by applying a current of 30mA amplitude and determines the time of etching which was 3 minutes, which allowed to reduce the uneve...

Download PDF file
  • EP ID EP577446
  • DOI -
  • Views 55
  • Downloads 0

How To Cite

Р. О. Стахов (2018). VULNERABILITY ANALYSES OF THE JSON WEB TOKEN DIGITAL SIGNATURE ALGORITHM. Вчені записки Таврійського національного університету імені В. І. Вернадського. Серія: Технічні науки, 29(2), 182-185. https://europub.co.uk./articles/-A-577446