O'Reilly logo

Secure XML: The New Syntax for Signatures and Encryption by Kitty Niles, Donald E. Eastlake

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 16. Combining Encryption and Signature

It is common to have data that must be authenticated to one or more recipients, for which all or parts of the data must remain confidential. While it is difficult to formulate general rules that always apply to such cases, Section 16.1 gives some of the general considerations. Section 16.2 describes a special Decryption Transform that makes it easier to determine which cipher text to decrypt before verifying a signature.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required