Coze is a cryptographic JSON messaging specification.
{
"pay": {
"msg": "Coze Rocks",
"alg": "ES256",
"iat": 1623132000,
"tmb": "cLj8vsYtMBwYkzoFVZHBZo6SNL8wSdCIjCKAwXNuhOk",
"typ": "cyphr.me/msg"
},
"sig": "Jl8Kt4nznAf0LGgO5yn_9HkGdY3ulvjg-NyRGzlmJzhncbTkFFn9jrwIwGoRAQYhjc88wmwFNH5u_rO56USo_w"
}
- Idiomatic JSON
- Human readable
- Limited scope
- Providing defined cipher suites
Coze defines standard fields for the objects pay, key, and coze. Applications may include additional fields as desired. While all fields are optional, omitting standard fields may limit compatibility. Binary values are encoded as RFC 4648 base 64 URI canonical with padding truncated (b64ut). JSON components are serialized into UTF-8 for signing, verification, and hashing. All JSON fields must be unique, and unmarshalling JSON with duplicate fields must result in an error.
pay
contains the fields alg
, iat
, tmb
, and typ
and optionally any
additional application fields. In the first example msg
is additional.
alg
- Specific cryptographic algorithm. E.g."ES256"
iat
- Unix time of message signature. E.g.1623132000
tmb
- Thumbprint of the signature's key. E.g."cLj8vs..."
typ
- Type ofpay
. E.g."cyphr.me/msg"
typ
's value may be used by applications as desired. The value is recommended
to denote API information such as versioning, expected fields, and/or other
application defined programmatic functions. In the first example,
"typ":"cyphr.me/msg"
denotes a pay
with the fields
["msg","alg","iat","tmb","typ"]
as defined by an application.
{
"alg":"ES256",
"iat":1623132000,
"kid":"Zami's Majuscule Key.",
"tmb":"cLj8vsYtMBwYkzoFVZHBZo6SNL8wSdCIjCKAwXNuhOk",
"x":"2nTOaFVm2QLxmUO_SjgyscVHBtvHEfo2rq65MvgNRjORojq39Haq9rXNxvXxwba_Xj0F5vZibJR3isBdOWbo5g"
}
{
"alg":"ES256",
"iat":1623132000,
"kid":"Zami's Majuscule Key.",
"d":"bNstg4_H3m3SlROufwRSEgibLrBuRq9114OvdapcpVA",
"tmb":"cLj8vsYtMBwYkzoFVZHBZo6SNL8wSdCIjCKAwXNuhOk",
"x":"2nTOaFVm2QLxmUO_SjgyscVHBtvHEfo2rq65MvgNRjORojq39Haq9rXNxvXxwba_Xj0F5vZibJR3isBdOWbo5g"
}
key
- Key object. E.g."key":{"alg":"ES256", ...}
alg
- Algorithm. E.g."ES256"
d
- Private component. E.g."bNstg4..."
iat
- "Issued at", Key creation Unix time. E.g.1623132000
kid
- "Key identifier", Non-programmatic label. E.g."kid":"My Cyphr.me Key"
.tmb
- Thumbprint. E.g."cLj8vs..."
x
- Public component. E.g."2nTOaF..."
.typ
- "Type", Application defined label. E.g."cyphr.me/key"
rvk
- "Revoke", Key revocation Unix time. E.g.1623132000
Note that the private component d
is not included in tmb
generation. Also
note that kid
must not be used programmatically while typ
may be used
programmatically.
The JSON name coze
may be used to wrap a coze.
{
"coze":{
"pay": {
"msg": "Coze Rocks",
"alg": "ES256",
"iat": 1623132000,
"tmb": "cLj8vsYtMBwYkzoFVZHBZo6SNL8wSdCIjCKAwXNuhOk",
"typ": "cyphr.me/msg"
},
"sig": "Jl8Kt4nznAf0LGgO5yn_9HkGdY3ulvjg-NyRGzlmJzhncbTkFFn9jrwIwGoRAQYhjc88wmwFNH5u_rO56USo_w"
}
}
coze
"Coze" Coze object. E.g.{"coze":{"pay":..., sig:...}}
can
"Canon" Canon ofpay
. E.g.["alg","iat","tmb","typ"]
cad
"Canon digest" Digest ofpay
. E.g."LSgWE4v..."
czd
"Coze digest" Digest of["cad","sig"]
. E.g.d0ygwQ...
pay
"Payload" Signed payload. E.g."pay":{"alg":...}
sig
"Signature" Signature overcad
. E.g."sig":"ywctP6..."
sig
is the signature over the bytes of cad
. cad
is not rehashed before
signing. czd
's hashing algorithm must align with alg
in pay
. czd
refers
to a particular signed message just as cad
refers to a particular payload.
cad
and czd
are calculated from brace to brace, including the braces. cad
and czd
are recalculatable and are recommended to be omitted from cozies,
although they may be useful for reference.
As an added technical constraint, because sig
and czd
are used as
identifiers, sig
must be non-malleable. Malleable schemes like ECDSA must
perform signature canonicalization that constrains signatures to a non-malleable
form.
Including unnecessary labels is not recommended. For example, the JSON object
{"pay":{...},"sig":...}
doesn't need the label coze
if implicitly known by
applications. The following should generally be omitted: key
may be looked up
by applications by using tmb
, the fields can
, cad
, and czd
are
recalculatable, and the label coze
may be inferred.
A tautologic coze:
{
"coze": {
"pay": {
"msg": "Coze Rocks",
"alg": "ES256",
"iat": 1623132000,
"tmb": "cLj8vsYtMBwYkzoFVZHBZo6SNL8wSdCIjCKAwXNuhOk",
"typ": "cyphr.me/msg"
},
"key": {
"alg":"ES256",
"iat":1623132000,
"kid":"Zami's Majuscule Key.",
"tmb":"cLj8vsYtMBwYkzoFVZHBZo6SNL8wSdCIjCKAwXNuhOk",
"x":"2nTOaFVm2QLxmUO_SjgyscVHBtvHEfo2rq65MvgNRjORojq39Haq9rXNxvXxwba_Xj0F5vZibJR3isBdOWbo5g"
},
"can": ["msg","alg","iat","tmb","typ"],
"cad": "Ie3xL77AsiCcb4r0pbnZJqMcfSBqg5Lk0npNJyJ9BC4",
"czd": "TnRe4DRuGJlw280u3pGhMDOIYM7ii7J8_PhNuSScsIU",
"sig": "Jl8Kt4nznAf0LGgO5yn_9HkGdY3ulvjg-NyRGzlmJzhncbTkFFn9jrwIwGoRAQYhjc88wmwFNH5u_rO56USo_w"
}
}
Simplified:
{
"pay": {
"msg": "Coze Rocks",
"alg": "ES256",
"iat": 1623132000,
"tmb": "cLj8vsYtMBwYkzoFVZHBZo6SNL8wSdCIjCKAwXNuhOk",
"typ": "cyphr.me/msg"
},
"sig": "Jl8Kt4nznAf0LGgO5yn_9HkGdY3ulvjg-NyRGzlmJzhncbTkFFn9jrwIwGoRAQYhjc88wmwFNH5u_rO56USo_w"
}
A canon is a list of fields used for normalization, e.g. ["alg","x"]
. Coze
objects are canonicalized for creating digests, signing, and verification. The
canon of pay
is the currently present fields in order of appearance. The
following Coze fields have predefined canons:
cad
's canon ispay
's canon.tmb
's canon is["alg","x"]
.czd
's canon is["cad","sig"]
.
Using a canon, the canonical form of an object is generated by removing fields not appearing in the canon, ordering remaining fields by appearance in the canon, and eliding unnecessary whitespace. The canonical form is serialized into UTF-8 for signing, verification, and hashing.
Canonical form generation steps:
- Omit fields not present in canon.
- Order fields by canon.
- Omit insignificant whitespace.
A canonical digest is generated by hashing the UTF-8 serialized canonical
form using the hashing algorithm specified by alg
. For example,"ES256"
's
hashing algorithm is "SHA-256"
.
The key thumbprint, tmb
, is the canonical digest of key
using the canon
["alg","x"]
and hashing algorithm specified by key.alg
. For example, a key
alg
of ES256
corresponds to the hashing algorithm SHA-256
. The canonical
form of the example key is:
{"alg":"ES256","x":"2nTOaFVm2QLxmUO_SjgyscVHBtvHEfo2rq65MvgNRjORojq39Haq9rXNxvXxwba_Xj0F5vZibJR3isBdOWbo5g"}
Hashing this canonical form results in the following digest, which is tmb
:
cLj8vsYtMBwYkzoFVZHBZo6SNL8wSdCIjCKAwXNuhOk
.
czd
is the canonical digest of coze
with the canon ["cad","sig"]
, which
results in the JSON {"cad":"...",sig:"..."}
. czd
's hash must align with
alg
in pay
.
The canonical digest of
pay
iscad
,["alg","x"]
istmb
,["cad","sig"]
isczd
.
Using the first example, the following canonical digests are calculated:
tmb
iscLj8vsYtMBwYkzoFVZHBZo6SNL8wSdCIjCKAwXNuhOk
cad
isLSgWE4vEfyxJZUTFaRaB2JdEclORdZcm4UVH9D8vVto
.czd
isd0ygwQCGzuxqgUq1KsuAtJ8IBu0mkgAcKpUJzuX075M
.
Signing and verification functions must not mutate pay
. Any mutation of pay
via can
must occur by canon related functions. Note that's since pay
's canon
is the present fields, no fields are removed when canonicalizing pay
.
The canonical digest of a binary file may simply be the digest of the file. The hashing algorithm and any other metadata may be denoted by an accompanying coze. For example, an image ("coze_logo_icon_256.png") may be referred to by its digest.
{
"alg":"SHA-256",
"file_name":"coze_logo_icon_256.png",
"id":"oDBDAg4xplHQby6iQ2lZMS1Jz4Op0bNoD5LK3KxEUZo"
}
For example, a file's digest, denoted by id
, may represent the authorization
to upload a file to a user's account.
{
"pay": {
"alg": "ES256",
"file_name": "coze_logo_icon_256.png",
"id": "oDBDAg4xplHQby6iQ2lZMS1Jz4Op0bNoD5LK3KxEUZo",
"iat": 1623132000,
"tmb": "cLj8vsYtMBwYkzoFVZHBZo6SNL8wSdCIjCKAwXNuhOk",
"typ": "cyphr.me/file/create"
},
"sig": "DgJb6Qb81uhC-ulZJlIIj8ahi0b5rAbtnkQhiEH1FB0HeNiACVh_Deo6a22OkK2tr0UcDOiIRY1X-BUriw03Mg"
}
A Coze key may be revoked by signing a coze containing the field rvk
with an
integer value greater than 0
. The integer value 1
is suitable to denote
revocation and the current Unix timestamp is the suggested value.
{
"pay": {
"alg": "ES256",
"iat": 1623132000,
"msg": "Posted my private key online",
"rvk": 1623132000,
"tmb": "cLj8vsYtMBwYkzoFVZHBZo6SNL8wSdCIjCKAwXNuhOk",
"typ": "cyphr.me/key/revoke"
},
"sig": "KVjPjMVHoL828WyAH5biqIOt-IOaQ5EBtN_7eQifP2w3agUHu6KfqO40_oqQ5GE_BShgXvhbK0O6Z2h5YPNAcw"
}
rvk
- Unix timestamp of key expiry.
Coze explicitly defines a self-revoke method so that third parties may revoke leaked keys. Systems storing Coze keys should provide an interface permitting a given Coze key to be marked as expired by receiving a self-revoke message. Self-revokes with future times must immediately be considered as expired.
rvk
and iat
must be a positive integer less than 2^53 – 1
(9,007,199,254,740,991), which is the integer precision limit specified by
IEEE754 minus one. Revoke checks must error if rvk
is not an integer or larger
than 2^53 - 1.
Key expiration policies, key rotation, backdating, and alternative revocation methods are outside the scope of Coze.
alg
specifies a parameter set and is a single source of truth for Coze
cryptographic operations.
- Name: ES256
- Genus: ECDSA
- Family: EC
- Use: sig
- Hash: SHA-256
- HashSize: 32
- HashSizeB64: 43
- XSize: 64
- XSizeB64: 86
- DSize: 32
- DSizeB64: 43
- Curve: P-256
- SigSize: 64
- SigSizeB64: 86
- ES224
- ES256
- ES384
- ES512
- Ed25519
- Ed25519ph (planned)
The Coze verifier is an in-browser tool for signing and verifying.
There is also the Simple Coze Verifier that has the minimal amount of code needed for a basic Coze application. Its codebase is in the Cozejs repo and may be locally hosted.
See docs/development.md
for the Go development guide.
The sections above are defined as the main Coze specification, Coze core. There are no plans to increase Coze's scope or features in core other than additional algorithm support. This will be especially true after Coze is out of Alpha/Beta. (At the moment, we would like more time for feedback before casting the specification into stone.)
Coze x (Coze extended) includes additional documentation, extra features, drafts, proposals, early new algorithms support that's not yet adopted in Coze core, and extended algorithm support.
See Coze_go_x/normal for an example of a Coze x feature not included in Coze core.
Repository structure:
- Coze Main specification (core) and the Go Coze reference implementation.
- CozeX Coze extended. Additional documents, discussion, and new algorithms (Not a code repository).
- CozeGoX Go implementation of extended features.
- CozeJS Javascript implementation of Coze core.
- CozeJSX Javascript implementation of extended.
- etc...
We say "Co-zee" like a comfy cozy couch. Jared suggested Coze because it's funny. The English word Coze is pronounced "kohz" and means "a friendly talk; a chat" which is the perfect name for a messaging standard.
We use upper case "Coze" to refer to the specification, and "coze"/"cozies" to refer to messages.
Coze's applications are endless as Coze is useful for anything needing cryptographic signing. Coze is deployed in various applications such as user authentication (user login), authorization, product tracking, user comments, user votes, chain of custody, Internet of things (IoT), sessions, and cookies.
As a timely example the CEO of Reddit (reddit.com/u/spez) edited people's comments. Messages signed by Coze prevents tampering by third parties.
JSON isn't well designed for large binary payloads. Instead, Coze suggests including the digest of a binary file in a coze message while transporting the binary separately. There's nothing stopping an application from base 64 encoding a binary for transport, although it's not recommended.
Coze is intentionally scope limited. It is easier to extend a limited standard than to fix a large standard. Coze can be extended and customized for individual applications.
alg
refers to a specific set of parameters for all operations and Coze Core
"versioning" is accomplished by noting specific algorithm support. If an
operation needs a different parameter set, alg
itself must denote the
difference. alg
permits Coze implementations to support a subset of features
while remaining Coze compliant. The specification hopes to stay simple and
stable enough to preclude versioning, however we suspect further tweaks are
probably warranted, so a long alpha and beta time is planned. Extension to Coze
are defined by CozeX so implementations avoid feature bloat.
Implementation releases themselves are versioned.
Coze's pay
includes all payload information, a design we've dubbed a "fat
payload". We consider single pass hashing critical for Coze's simple design.
Alternative schemes require a larger canon, {"head":{...},"pay":{...}}
, or
concatenation like digest(head) || digest(pay)
. By hashing only pay
, the
"head" label and encapsulating braces are dropped, pay:{...}
, and the label
"pay"
may then be inferred, {...}
. {...}
is better than
{"head":{...},"pay":{...}}
.
Verifying a coze already requires hashing pay
. Parsing alg
from pay
is a
small additional cost.
Coze is well suited for JSON APIs. API versioning may be handled by applications
however desired. A suggested way of incorporating API versioning in Coze is to
use typ
, e.g. "typ":"cyphr.me/v1/msg/create"
, where "v1" is the api version.
Yes, canon is suitable for general purpose application. Applications may
specify canon expectations in API documentation, if using Coze denoted by "typ"
or explicitly specified by can
, or implicitly known and pre-established. Coze
Core contains simple canonicalization functions, or for more expressive
capabilities see Normal.
For applications, pay.typ
may denote a canon. For example, a typ
with value
cyphr.me/msg/create
has a canon, as defined by the service, of ["alg", "iat",
"msg", "tmb", "typ"]. The service may reject a coze that's not canonicalized as
expected. For example, the service might reject cozies missing iat
.
Key.tmb
ignores key.typ
because a static canon, ["alg","x"]
is always used
when producing key's tmb
. Like typ
in pay
, applications may use key.typ
to specify custom fields, e.g. "first_seen" or "account_id" and field order.
For ECDSA , (X and Y) and (R and S) are concatenated for x
and sig
respectively. For ES512, which unlike the other ECDSA algorithms uses the odd
numbered P-521, X, Y, R, and S are padded before concatenation.
Coze places no limit on public key size, which can be very large. For example,
GeMSS128 public keys are 352,188 bytes, compared to Ed25519's 32 bytes. Using
tmb
instead of x
generalizes Coze for present and future algorithm use.
Additionally, x
may be cryptographically significant for key security while
tmb
is not.
The standard fields provide Coze and applications fields with known types since JSON has limited type identifiers. Coze has no required fields, however omitting standard fields limits interoperability among applications, so it is suggested to include standard fields appropriately.
Cozies that are missing the fields pay.alg
and/or pay.tmb
are contextual
cozies, denoting that additional information is needed for verification.
Caution is urged when deploying contextual cozies as including the standard
fields pay.alg
and pay.tmb
is preferred.
An empty coze, which has an empty pay
and populated sig
, is legitimate.
It may be verified if key
is known. The following empty coze was signed with
the example key "cLj8vs".
{
"pay":{},
"sig":"9iesKUSV7L1-xz5yd3A94vCkKLmdOAnrcPXTU3_qeKSuk4RMG7Qz0KyubpATy0XA_fXrcdaxJTvXg6saaQQcVQ"
}
Canonical base 64 (sometimes called "strict") encoding is required and non-strict encoding of both b64ut and UTF-8 must error. For the initial reason for why Coze uses b64ut see base64.md.
Why not PGP/OpenSSL/LibreSSL/SSHSIG/libsodium/JOSE(JWT)/COSE/etc...? How does Coze compare with prior arts?
We respect the various projects in the space. Other projects have noble goals and we're thankful they exist. Coze is influenced by ideas from many others. However existing solutions were not meeting our particular needs so we created Coze.
See coze_vs.md and the introduction presentation for more.
x
, tmb
,cad
, czd
, and sig
may be used for integrity checking.
Systems may use sig
as an integrity check via cryptographic verification. If
cad
and/or czd
are included they may be recalculated and error on mismatch.
For keys, x
and/or tmb
may be recalculated and error on mismatch.Coze keys
cannot be integrity checked when d
, x
, or tmb
are presented alone. In
situations needing integrity checking, we recommend including at least two
components. See checksums.md for more.
Coze is not optimized for long messages, but if early knowledge of Coze standard
fields is critical for application performance, put the Coze standard fields
first, e.g. {"alg", "tmb", ...}
If appending custom fields after the standard Coze fields isn't sufficient, we suggest encapsulating custom JSON in "~", the last ASCII character. We've dubbed this a "tilde encapsulated payload". For example:
{
"alg": "ES256",
"iat": 1623132000,
"tmb": "cLj8vsYtMBwYkzoFVZHBZo6SNL8wSdCIjCKAwXNuhOk",
"typ": "cyphr.me/msg/create",
"~": {
"msg": "tilde encapsulated payload"
}
}
Even though Javascript uses UTF-16 and JSON was designed in a Javascript context, JSON implementations rejected the problematic UTF-16, which has some code points out of order, in favor of UTF-8. Requiring JSON UTF-8 encoding was formalized by the JSON RFC 8259 section 8.1. Unicode, ASCII, and UTF-8 all share sorting order.
Although JSON arrays are defined as ordered, JSON objects are defined as
unordered. How is pay
, an unordered JSON object, signed when signing requires
a static representation? UTF-8 is the explicitly defined serialization for
JSON. Coze's signing and verification operations are not over
abstract JSON, but rather the concrete UTF-8. Coze marshals JSON into UTF-8
before signing, and Coze verifies UTF-8 before unmarshalling into JSON.
Additionally, object field order may be denoted by can
, chaining
normals, or communicate via other means.
Much of this comes from NIST FIPS.
For example, FIPS PUB 186-3 defines P-224, P-256, P-384, and P-521.
To learn more see this walkthrough of ECDSA.
The following are out of scope or redundant.
ES192
,P-192
- Not implemented anywhere and dropped from later FIPS.SHA1
,MD5
- Not considered secure for a long time.kty
- "Key type". Redundant byalg
.iss
-tmb
fulfills this role. Systems that need something like an issuer, associating messages with people/systems, can look up "issuer" based on thumbprint. Associating thumbprints to issuers is the design we recommend.exp
- "Expiration". Outside the scope of Coze.nbf
- "Not before". Outside the scope of Coze.aud
- "Audience". Outside the scope of Coze, but consider denoting this withtyp
.sub
- "Subject". Outside the scope of Coze, but consider denoting this withtyp
.jti
- "Token ID/JWT ID". Redundant byczd
,cad
, or an application specified field.
Coze does not currently support encryption. If or when it ever does it would be similar to or simply complement age.
It’s not enough to implement a single standard; it’s vital that our systems be able to easily swap in new algorithms when required. We’ve learned the hard way how algorithms can get so entrenched in systems that it can take many years to update them: in the transition from DES to AES, and the transition from MD4 and MD5 to SHA, SHA-1, and then SHA-3.
Coze's design is generalized and not overly coupled to any single primitive. Because of this, applications that use Coze can easy upgrade cryptographic primitives. Using a single primitive is perfectly fine, but tightly coupling systems to a single primitive is not. Simultaneous support for multiple primitives is a secondary, and optional, perk.
They're all synonyms. A JSON name is a JSON key is a JSON field name is a JSON member name. In this document we use "field name" to avoid confusion with Coze key.
Coze explicitly requires that implementations disallow duplicate field names in
coze
, pay
, and key
. Existing JSON implementations have varying behavior.
Douglas Crockford, JSON's inventor, tried to fix this but it was decided it
was too late.
Although Douglas Crockford couldn't change the spec forcing all implementations
to error on duplicate, his Java JSON implementation errors on duplicate names.
Others use last-value-wins
, support duplicate keys, or other non-standard
behavior. The JSON
RFC states that
implementations should not allow duplicate keys, notes the varying behavior
of existing implementations, and states that when names are not unique, "the
behavior of software that receives such an object is unpredictable." Also note
that Javascript objects (ES6) and Go structs already require unique names.
Duplicate fields are a security issue, a source of bugs, and a surprising behavior to users. See the article, "An Exploration of JSON Interoperability Vulnerabilities"
Disallowing duplicates conforms to the small I-JSON RFC. The author of I-JSON, Tim Bray, is also the author of current JSON specification (RFC 8259). See also json5/json5-spec#38.
Although humans cannot verify a signature without the assistance of tools, readability allows humans to visually verify what a message does.
We saw the need for JSON-centric cryptography and idiomatic JSON is human readable. JSON is not a binary format; it is a human readable format and any framwork built on JSON should embrace its human readability. If human readability is unneeded, JSON is entirely the wrong message format to employ. All else being equal, human readability is better than non-human readability.
See also I-JSON and JSON5
When using Coze with HTTP cookies, Coze messages should be JSON minified. For example, we've encountered no issues using the first example as a cookie:
token={"pay":{"msg":"Coze Rocks","alg":"ES256","iat":1623132000,"tmb":"cLj8vsYtMBwYkzoFVZHBZo6SNL8wSdCIjCKAwXNuhOk","typ":"cyphr.me/msg"},"sig":"Jl8Kt4nznAf0LGgO5yn_9HkGdY3ulvjg-NyRGzlmJzhncbTkFFn9jrwIwGoRAQYhjc88wmwFNH5u_rO56USo_w"}; Path=/; Secure; Max-Age=999999999; SameSite=None
For more considerations see http_headers.md
Coze was released on 2021/06/08 (1623132000) since it's 30 years and one day after the initial release of PGP 1.0. We wrote a blog with more details of Coze's genesis.
Coze prohibits signature malleability. See malleability_low_s.md.
Coze was created by Cyphr.me.
- We have a bridged Matrix and Telegram chat room. (This is where we are the most active)
- Matrix: https://app.element.io/#/room/#cyphrmepub:matrix.org
- PM zamicol for our bridged Telegram group.
- We also hang out in the Go rooms:
- https://twitter.com/CozeJSON
- https://old.reddit.com/r/CozeJson
- This README as a page: https://cyphrme.github.io/Coze/
- Coze go.pkg.dev
- CozeJSON.com (which is currently pointed to the Coze verifier)
- Coze Table links: https://docs.google.com/document/d/15_1R7qwfCf-Y3rTamtYS_QXuoTSNrOwbIRopwmv4KOc
Coze JSON alg iat tmb typ rvk kid d x coze pay key can cad czd sig cryptography crypto authentication auth login hash digest signature Cypherpunk Cyphrme Ed25519 Ed25519ph ES224 ES256 ES384 ES512 SHA-224 SHA-256 SHA-384 SHA512 JOSE JWS JWE JWK JWT PASETO PASERK signify ssh SSHSIG PGP Bitcoin Ethereum base64 b64ut SQRL
Coze is released under The 3-Clause BSD License.
"Cyphr.me" is a trademark of Cypherpunk, LLC. The Cyphr.me logo is all rights reserved Cypherpunk, LLC and may not be used without permission.