Menu
Home Explore People Places Arts History Plants & Animals Science Life & Culture Technology
On this page
XML Encryption
Is a specification, governed by a W3C recommendation, that defines how to encrypt the contents of an XML element.

XML Encryption (XML-Enc) is a specification governed by a World Wide Web Consortium (W3C) recommendation, that defines how to encrypt the contents of an XML element.

We don't have any images related to XML Encryption yet.
We don't have any YouTube videos related to XML Encryption yet.
We don't have any PDF documents related to XML Encryption yet.
We don't have any Books related to XML Encryption yet.
We don't have any archived web articles related to XML Encryption yet.

Specification

Although XML Encryption can be used to encrypt any kind of data, it is nonetheless known as "XML Encryption" because an XML element (either an EncryptedData or EncryptedKey element) contains or refers to the cipher text, keying information, and algorithms.1

Both XML Signature and XML Encryption use the KeyInfo element, which appears as the child of a SignedInfo, EncryptedData, or EncryptedKey element and provides information to a recipient about what keying material to use in validating a signature or decrypting encrypted data.

The KeyInfo element is optional: it can be attached in the message, or be delivered through a secure channel.

XML Encryption is different from and unrelated to Transport Layer Security (TLS), which is used to send encrypted messages (including XML content, both encrypted and otherwise) over the internet.

Jager & Somorovsky (2011) reported that this specification has severe security concerns. In response to this,2 the specification of XML Encryption 1.1 published in 2013 included a Galois/Counter Mode block cypher algorithm.3

Citations

Sources

References

  1. XMLENC 1.0, section 2. - Imamura, T.; Dillaway, B.; Simon, E. (10 December 2002). Eastlake, D.; Reagle, J. (eds.). "XML Encryption Syntax and Processing". W3C. https://www.w3.org/TR/2002/REC-xmlenc-core-20021210

  2. Jager, Paterson & Somorovsky (2013). - Jager, T.; Paterson, K. G.; Somorovsky, J. (24 April 2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. NDSS Symposium 2013. https://www.ndss-symposium.org/ndss2013/ndss-2013-programme/one-bad-apple-backwards-compatibility-attacks-state-art-cryptography/

  3. Kupser et al. (2015). - Kupser, D.; Mainka, C.; Schwenk, J.; Somorovsky, J. (August 2015). How to Break XML Encryption – Automatically. 9th USENIX Workshop on Offensive Technologies (WOOT '15). https://www.usenix.org/conference/woot15/workshop-program/presentation/kupser