O'Reilly logo

Secure XML: The New Syntax for Signatures and Encryption by Kitty Niles, Donald E. Eastlake

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

18.5. Block Encryption Algorithms

Block encryption algorithms are designed for encrypting and decrypting data. Their identifiers normally appear as the value of the Algorithm attributes of EncryptionMethod elements that are children of EncryptedData (see Figure 18-1).

Block encryption algorithms take, as implicit arguments, the data to encrypt or decrypt, the keying material, and their direction of operation. All of the algorithms specified in this section require an initialization vector (IV). This IV is encoded with the cipher text. For user-specified block encryption algorithms, the IV, if any, could be specified as being with the cipher data, as the content of an algorithm element, or elsewhere.

The IV is prefixed to and encoded with the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required