Part VI: Algorithms

Throughout both XML Digital Signatures, covered in Part III, and XML Encryption, covered in Part V, we have noted provisions for referring to algorithms using URIs as well-known names. These include both cryptographic algorithms, which actually do the bit scrambling and unscrambling of cryptography, and algorithms operating at the XML or text level. For most types of algorithms, one or a few algorithms are mandatory to implement—their use maximizes the possibility of interoperability. Other algorithms are optional. The URI naming convention is so general that proprietary or nonstandard user-specified algorithms are easily accommodated though their use decreases the chances for interoperability.

Chapter 17 provides an overview ...

Get Secure XML: The New Syntax for Signatures and Encryption now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.