O'Reilly logo

Secure XML: The New Syntax for Signatures and Encryption by Kitty Niles, Donald E. Eastlake

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

15.5. Encryption Security Considerations

This section discusses some special security considerations in XML Encryption.

15.5.1. Combining XMLDSIG and XML Encryption

Special considerations apply when you use both authentication and confidentiality together. Refer to Chapter 16 for more details.

15.5.2. Information Revealed

As discussed in Chapter 2, when you share a symmetric key amongst multiple recipients, you can safely use that key only for data intended for all recipients. That is, any recipient not sent the data might intercept the information and decrypt it.

Application designers should not reveal any information in parameters or algorithm identifiers (e.g., in plain text URIs) that weakens the encryption or tends to compromise the plain ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required