This section discusses some special security considerations in XML Encryption.
Special considerations apply when you use both authentication and confidentiality together. Refer to Chapter 16 for more details.
As discussed in Chapter 2, when you share a symmetric key amongst multiple recipients, you can safely use that key only for data intended for all recipients. That is, any recipient not sent the data might intercept the information and decrypt it.
Application designers should not reveal any information in parameters or algorithm identifiers (e.g., in plain text URIs) that weakens the encryption or tends to compromise the plain ...