Verification result will appear here
Paste a JWS token and click "Verify JWS Signature"
Every coffee helps keep the servers running. Every book sale funds the next tool I'm dreaming up. You're not just supporting a site — you're helping me build what developers actually need.
JWS Signature Verification is the process of cryptographically validating that a JSON Web Signature token has not been tampered with and was signed by a trusted party.
header.payload using the shared secretheader.payload| Error | Cause | Solution |
|---|---|---|
| Signature Invalid | Wrong key or modified token | Verify you're using the correct key that matches the signing key |
| Algorithm Mismatch | Using HMAC key with RSA algorithm or vice versa | Check the alg header and use the appropriate key type |
| Key Format Error | Invalid PEM format or encoding | Ensure public keys include BEGIN/END markers and proper Base64 encoding |
| Invalid JWS Format | Token doesn't have three parts | JWS must be in format: header.payload.signature |
alg: noneexp, nbf, iss, audHeader - Contains alg (algorithm) and optionally typ, kid
Payload - Contains claims (sub, name, iat, exp, etc.)
Signature - Cryptographic signature over header.payload
This JWS verification tool is developed by Anish Nath ( @anish2good), a Security Engineer specializing in cryptography and web security.