O'Reilly logo

Secure XML: The New Syntax for Signatures and Encryption by Kitty Niles, Donald E. Eastlake

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. XML Encryption

After Section 15.1 introduces XML Encryption, Section 15.2 describes its detailed syntax and Section 15.3 gives some examples of this encryption scheme. You can read Sections 15.2 and 15.3 in either order, depending on whether you prefer to learn first from examples or from detailed specifications.

Section 15.4 provides the processing rules for cipher text generation and decryption.

Section 15.5 describes a number of warning and security considerations in the use of XML Encryption.

This chapter is based on the XML Encryption Syntax and Processing W3C Working Draft [XMLENC]. When this book went to press, that draft was in Last Call by the XML Encryption Working Group [XMLENC WG].

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required