Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 571

JWE

What is JWE?

JWEJSON Web Encryption (RFC 7516) is a JOSE format that confidentially encapsulates a payload using authenticated encryption and either a key-wrapping or key-agreement scheme.


JWE (RFC 7516) defines how to encrypt arbitrary content so that only intended recipients can decrypt and verify it. The Compact Serialization has five Base64URL parts: protected header, encrypted key, IV, ciphertext, and authentication tag. The header's alg parameter selects the key-management mode, such as RSA-OAEP-256, ECDH-ES+A256KW, A256KW, or dir, while enc selects the AEAD bulk cipher, typically A256GCM or A128CBC-HS256. JWE underpins encrypted ID tokens, nested JWTs (JWS-then-JWE), and OpenID Connect for high-assurance flows. Implementers must use authenticated encryption, validate aud/iss claims of the inner JWS, prefer ECDH-ES with X25519 over RSA-OAEP for new deployments, and avoid the Bleichenbacher-style oracles of RSA1_5.

Examples

  1. 01

    An OpenID Connect ID token wrapped in a JWE so the IdP can hide claims from intermediate proxies.

  2. 02

    A confidential message between two services encoded as a JWE with ECDH-ES+A256KW key agreement and A256GCM.

Frequently asked questions

What is JWE?

JSON Web Encryption (RFC 7516) is a JOSE format that confidentially encapsulates a payload using authenticated encryption and either a key-wrapping or key-agreement scheme. It belongs to the Cryptography category of cybersecurity.

What does JWE mean?

JSON Web Encryption (RFC 7516) is a JOSE format that confidentially encapsulates a payload using authenticated encryption and either a key-wrapping or key-agreement scheme.

How does JWE work?

JWE (RFC 7516) defines how to encrypt arbitrary content so that only intended recipients can decrypt and verify it. The Compact Serialization has five Base64URL parts: protected header, encrypted key, IV, ciphertext, and authentication tag. The header's alg parameter selects the key-management mode, such as RSA-OAEP-256, ECDH-ES+A256KW, A256KW, or dir, while enc selects the AEAD bulk cipher, typically A256GCM or A128CBC-HS256. JWE underpins encrypted ID tokens, nested JWTs (JWS-then-JWE), and OpenID Connect for high-assurance flows. Implementers must use authenticated encryption, validate aud/iss claims of the inner JWS, prefer ECDH-ES with X25519 over RSA-OAEP for new deployments, and avoid the Bleichenbacher-style oracles of RSA1_5.

How do you defend against JWE?

Defences for JWE typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for JWE?

Common alternative names include: JSON Web Encryption.

Related terms

See also