Chapter 16. Combining Encryption and Signature

It is common to have data that must be authenticated to one or more recipients, for which all or parts of the data must remain confidential. While it is difficult to formulate general rules that always apply to such cases, Section 16.1 gives some of the general considerations. Section 16.2 describes a special Decryption Transform that makes it easier to determine which cipher text to decrypt before verifying a signature.

Get Secure XML: The New Syntax for Signatures and Encryption now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.