Appendices
Appendix A. Algorithm Identifier Cross-Reference
A.1 Digital Signature/MAC Algorithm Identifier Mapping
Correspondence between JWS algorithms and other standards
A.2 Key Management Algorithm Identifier Mapping
Correspondence between JWE key management algorithms and other standards
A.3 Content Encryption Algorithm Identifier Mapping
Correspondence between JWE content encryption algorithms and other standards
Appendix B. Test Cases for AES_CBC_HMAC_SHA2
Provides test vectors for AES_CBC_HMAC_SHA2 algorithms to verify implementation correctness.
Appendix C. Example ECDH-ES Key Agreement Computation
Demonstrates complete ECDH-ES key agreement computation process, including:
- Ephemeral key pair generation
- Shared secret computation
- Concat KDF key derivation
- Final CEK generation
Note: For detailed test cases and example computations, see RFC 7518 original text appendices.