O'Reilly logo

Secure XML: The New Syntax for Signatures and Encryption by Kitty Niles, Donald E. Eastlake

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Part VI: Algorithms

Throughout both XML Digital Signatures, covered in Part III, and XML Encryption, covered in Part V, we have noted provisions for referring to algorithms using URIs as well-known names. These include both cryptographic algorithms, which actually do the bit scrambling and unscrambling of cryptography, and algorithms operating at the XML or text level. For most types of algorithms, one or a few algorithms are mandatory to implement—their use maximizes the possibility of interoperability. Other algorithms are optional. The URI naming convention is so general that proprietary or nonstandard user-specified algorithms are easily accommodated though their use decreases the chances for interoperability.

Chapter 17 provides an overview ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required