Friday, May 12, 2006

XML Encryption

XML Encryption allows hiding all or part of the XML document (confidentiality) from anyone other than the private key holder.

XML encryption is implemented using shared key (symmetric) cryptography. In shared key cryptography, the data is encrypted and decrypted by the same key. The challenge lies in transporting the shared key to the recipient. This one challenge in shared key cryptography, can simply makes its purpose meaningless. Because any intruder who receives the shared key and simply encrypt the message which is supposed to be confidential to the intended recipient. So the critical aspect is to secure the shared key itself.

This challenge is handled in XML encryption using public key (asymmetric) cryptography. The shared key is encrypted using the recipient's public key and sent to the recipient along with the encrypted data. Notice that both the data and key are encrypted, but both are encrypted using different keys. Data by shared key and key by recipient's public key. Hence the recipient will first decrypt the encrypted key using its private key and retrieve the shared key. Then it uses the shared key to decrypt the encrypted data.

Thus the shared key is transferred securely and the data's confidentiality is also maintained.

It is worth to discuss reg. the symmetric and asymmetric cryptographies. In asymmetric cryptography there is no need to distribute the encryption key. The public key of the recipient is published and the sender encrypts the data using the public key; and the private key to decrypt the message is possessed only by the recipient. But in asymmetric cryptography, the encryption using public key and the decryption using the private key are much slower when compared to symmetric cryptography. This performance issue becomes more critical when the data is big. Hence it is a common practice to combine the advantages of both the cryptographies. The encryption and decryption is done using the shared key as in symmetric cryptography and the distribution of the shared key is done using asymmetric cryptography. As only the shared key is processed using asymmetric cryptography, the performance issue is neglible when compared to processing the whole data. This same concept is implemented in XML encryption.

2 comments:

Lakshana said...

I remember learning this stuff in my masters.... i didnt comprehend it fully then and i dont comprehend it now either.

Anonymous said...

The boy with freckles took his companion by the arm without another http://startso11.info/pozycjonowanie+stron+www.html word and marched him down the stairs.. He lightly put aside the compliment http://startso11.info/www.gry+on-line.pl.html with a wave of his white hand.. Analysis: He feels sure http://startso11.info/MSNBC.html that even the first dream contains a reference to the lady whom he is to meet at the rendezvous (the dream was dreamed during the night before the expected meeting).. At last, with the crowning threat, up went the spear for an astounding thump, http://rebestal.info/com++tv.html and down came a large piece of the ceiling, and with it--a shower of letters.. Then he passed from http://startso11.info/www.dibom.pl.html view.. In the analysis the dreamer first thought of a story told him by his http://startso11.info/erfumeria.html uncle, which chronologically was later than the dream, viz.. It was http://startso11.info/ATRYDZI.html the case of a strict and crabbed father who lived unhappily with his mother, and whose educational methods consisted in threats; of the separation of his father from his tender and delicate mother, and the remarrying of his father, who one day brought home a young woman as his new mamma.. That's what I get for coming here with you, Ross Pryor! And tears of humiliation stood in his eyes. http://startso11.info/www.powwyszkowski.com.pl.html. 'Decidedly I must step down and see about that http://startso11.info/www.sp312.pl.html vessel,' said my grandfather Titbottom.. It was a http://startso11.info/jak+biegac.html queer figure that crept along the road that cheery May morning.. Und you acknowledge tat you pe te blind dronk und te vool? I nodded http://startso11.info/www.fjak.html once more.. Deliverance came from http://startso11.info/www.tamatown.pl..html an entirely unexpected source.. Do you happen to know upon what charge you http://startso11.info/www.high-school-musical.blog-onet.pl.html were arrested? Yes; I believe for infanticide.. On the smaller one my surname stood in the place where the painter's signature should be; it seemed http://startso11.info/www.alegro+ogr%C3%B3d.html to be intended for my birthday present.. It is in fact the wish-fulfillment that http://storyah44.info/plan++miasta+wroc%C5%82aw.html has already induced us to separate dreams into two groups.. Belmont Van Kamp, wife, and daughter. http://startso11.info/briggs.html. This thing, for very obvious reasons, I found it http://startso11.info/nauka+tanca+w+gdansku.html quite impossible to do.. system, where alone, if anywhere, it can maintain itself; http://startso11.info/gimnazjum+w+po%C5%82a%C5%84cu+gimnazjum+w+po%C5%82a%C5%84cu.html while a wish-feeling of the third order we consider altogether incapable of leaving the Unc.. As such a questioning on the side of the father has never taken place in reality, we must conceive http://startso11.info/www.auto.sprzedaz.pl.html the dream thought as a wish, or take it conditionally, as follows: If I had only asked my father for sexual enlightenment.. It may be said to be almost the rule that one train of thought is followed http://storyah44.info/pttk+Warszawa.html by its contradictory...