O'Reilly logo

Secure XML: The New Syntax for Signatures and Encryption by Kitty Niles, Donald E. Eastlake

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 17. Overview of Algorithms

XML Security elements require the specification of a variety of algorithms to fill various roles, such as signature generation and data encryption. Section 17.1 describes the uniform syntax used for this specification. Section 17.2 presents an overview of the various algorithmic roles and the elements that fill them, together with tables of some summary information on the algorithms.

Chapters 18 and 19 provide additional details on specific cryptographic and non-cryptographic algorithms, respectively.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required