O'Reilly logo

Secure XML: The New Syntax for Signatures and Encryption by Kitty Niles, Donald E. Eastlake

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

10.3. XML Signature Examples

This section provides four examples of XML digital signatures, starting with simple cases and working toward more complex cases. Two of the examples are protocol oriented, and two are form/paper oriented.

10.3.1. Simple Protocol Example

Assume you want to efficiently secure protocol messages between two parties. One technique would be to use efficient shared secret key message authentication, like that shown in Example 10-6. In this example, the Data element in a protocol message needs to be authenticated. Because we assume that it is an established connection for a simple protocol, the sender and receiver have already agreed on a key, and thus no KeyInfo is present.

Example 10-6. Simple protocol signature
 [L01] ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required