Skip to content

Instantly share code, notes, and snippets.

View cyberphone's full-sized avatar
😎
Hi there!

Anders Rundgren cyberphone

😎
Hi there!
View GitHub Profile
@cyberphone
cyberphone / crypto-alternative.txt
Last active January 10, 2024 07:33
Signed data, followed by partial encrypt
Code showing a payment authorization where all data is signed.
Since some of the signed data contains PII this part is removed
(after being signed) and then encrypted using a public key.
The encryption key is issuer-wide for avoiding PII.
The goal is creating a compact container only needing a single
signing and encryption operation. By keeping the transaction
request in clear, data duplication is minimized.
The need for encryption is because the authorization is sent back
@cyberphone
cyberphone / dpop-signed-request
Created February 3, 2021 15:42
DPoP signed request
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