Chapter 17. Overview of Algorithms

XML Security elements require the specification of a variety of algorithms to fill various roles, such as signature generation and data encryption. Section 17.1 describes the uniform syntax used for this specification. Section 17.2 presents an overview of the various algorithmic roles and the elements that fill them, together with tables of some summary information on the algorithms.

Chapters 18 and 19 provide additional details on specific cryptographic and non-cryptographic algorithms, respectively.

Get Secure XML: The New Syntax for Signatures and Encryption now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.