Skip to main content

Appendices

Appendix A. Algorithm Identifier Cross-Reference

A.1 Digital Signature/MAC Algorithm Identifier Mapping

Correspondence between JWS algorithms and other standards

A.2 Key Management Algorithm Identifier Mapping

Correspondence between JWE key management algorithms and other standards

A.3 Content Encryption Algorithm Identifier Mapping

Correspondence between JWE content encryption algorithms and other standards

Appendix B. Test Cases for AES_CBC_HMAC_SHA2

Provides test vectors for AES_CBC_HMAC_SHA2 algorithms to verify implementation correctness.

Appendix C. Example ECDH-ES Key Agreement Computation

Demonstrates complete ECDH-ES key agreement computation process, including:

  • Ephemeral key pair generation
  • Shared secret computation
  • Concat KDF key derivation
  • Final CEK generation

Note: For detailed test cases and example computations, see RFC 7518 original text appendices.