Chapter 17. Overview of Algorithms

XML Security elements require the specification of a variety of algorithms to fill various roles, such as signature generation and data encryption. Section 17.1 describes the uniform syntax used for this specification. Section 17.2 presents an overview of the various algorithmic roles and the elements that fill them, together with tables of some summary information on the algorithms.

Chapters 18 and 19 provide additional details on specific cryptographic and non-cryptographic algorithms, respectively.

Get Secure XML: The New Syntax for Signatures and Encryption now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.