Generate ECDSA Signature
Signs data using an Elliptic Curve Digital Signature Algorithm (ECDSA) private key.
In the diagram below, the dark rectangle represents the activity of signing some data using a private key that is stored at a safe location.

Also see: Create ECDSA Keys, Verify ECDSA Signature.
Properties
Private key
The private ECDSA key to use to generate the signed data (see Create ECDSA Keys). The key can be given as a list of bytes or a base64 string.
Hash algorithm
The hash algorithm to use when signing the data.
Options:
SHA256 - learn more
SHA384 - learn more
SHA512 - learn more
Data
The data to sign. This can be a list of bytes or a base64 string.
Definition
The ECDSA signature in the form of a list of bytes.
Example
A simple usage scenario is where the private key is retrieved from a local database and used to sign some data which is received as input.
Links
Last updated