O'Reilly logo

Secure XML: The New Syntax for Signatures and Encryption by Kitty Niles, Donald E. Eastlake

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

15.4. Processing Flow

This section describes the sequence of operations for XML encryption and decryption processing. The XML Encryption Recommendation [XMLENC] attempts to define the boundary between the application and an encrypter or decrypter, but it remains flexible because some steps may be carried out by either one. Discussion of cryptographic and directly related processing, where XMLDSIG is used as an analogy, appears in the subsections “Encryption Processing” and “Decryption Processing.” Discussion of other “application” processing appears in the subsections “Pre-encryption Processing,” “Post-encryption Processing,” “Pre-decryption Processing,” and “Post-decryption Processing.”

15.4.1. Encryption

The following steps need to be performed ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required