JSON Web Tokens: A study about their application
Abstract
The JSON Web Token is a security standard for communicating data between clients and servers. It is structured by a header which has the cryptography norms used, the payload which has the data that is going to be cryptographed and the signature that has the key used to cryptograph the entire token using the cryptographic algorithm defined in the header. Its main advantage is not being dependable in databases to store the core information allowing different applications to share that data with each other, but as a disadvantage the token stays online till its due date which can cause problems in case of a security breach of confidential data of the users.
References
K. Nagaraj, “Security hash Algorithm 1(SHA-1): A Comprehensive Overview”, Medium, [link]. (Mar. 3. 2023)
D. Moore, “Components of JWTs Explained”, Fusion Auth, [link].
“Prevenção de ataques Cross-site Request Forgery (CSRF)”, IBM, [link] (Jan. 30. 2024)
D. Detering, J. Somorovsky, C. Mainka, V. Mladenov e J. Schwenk. “On The (In-)Security Of JavaScript Object Signing And Encryption”. Association for Computing Machinery. [link]. (Nov. 16. 2017)
L. Santos. “Usando tokens JWT de forma segura”. Lucas [link]. (Ago. 18. 2022.)
OAuth vs. JWT: Ultimate Comparison”, Permify, [link]. (Jun. 26. 2024)
