The signing process requires a security key pair and a signing tool to sign the image. The private and public key pair are generated based on a 256 bit ECDSA asymmetric digital signature. The private key has full entropy and is used to derive the public key.
The signing process creates a digital certificate with signatures based on elliptic curve cryptography. The credentials of the signed image during authentication are the digital signature and the public key.
Did you find the information on this page useful?