Every coffee helps keep the servers running. Every book sale funds the next tool I'm dreaming up. You're not just supporting a site — you're helping me build what developers actually need.
JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures, as defined in RFC 7515.
Use this tool when you need to:
| Algorithm | Type | Key Type | Hash | Use Case |
|---|---|---|---|---|
HS256 |
HMAC | Shared Secret (32+ bytes) | SHA-256 | Internal APIs, microservices |
HS384 |
HMAC | Shared Secret (48+ bytes) | SHA-384 | Higher security internal use |
HS512 |
HMAC | Shared Secret (64+ bytes) | SHA-512 | Maximum HMAC security |
RS256 |
RSA PKCS#1 | RSA Private Key | SHA-256 | Widely compatible, OAuth 2.0 |
RS384 |
RSA PKCS#1 | RSA Private Key | SHA-384 | Higher RSA security |
RS512 |
RSA PKCS#1 | RSA Private Key | SHA-512 | Maximum RSA security |
PS256 |
RSA-PSS | RSA Private Key | SHA-256 | More secure than PKCS#1 |
PS384 |
RSA-PSS | RSA Private Key | SHA-384 | High security RSA-PSS |
PS512 |
RSA-PSS | RSA Private Key | SHA-512 | Maximum RSA-PSS security |
ES256 |
ECDSA | EC P-256 Private Key | SHA-256 | Modern, compact signatures |
ES384 |
ECDSA | EC P-384 Private Key | SHA-384 | Higher EC security |
ES512 |
ECDSA | EC P-521 Private Key | SHA-512 | Maximum EC security |
Plain text shared secret. Minimum lengths:
PEM format with markers:
-----BEGIN RSA PRIVATE KEY----------END RSA PRIVATE KEY-----
Or PKCS#8 format
PEM format with markers:
-----BEGIN EC PRIVATE KEY----------END EC PRIVATE KEY-----
Curve must match algorithm