SHA256
to create a cryptographic hashes. The Blake2b256
and Keccak256
hashing algorithms are used for creating public/secret key pairs. The ED25519
scheme is applied to create and verify signatures. X25519
is used to for asymmetric encryption. For symmetric encrypt use AES256
in Galois/Counter Mode (gcm). Base58
is used to create the string from of bytes.AMQP 0-9-1
to communicate and SHOULD be available over a secured connection.$schema
property MUST be set which is used to execute an action of to display it correctly in the UI.