Download presentation
Presentation is loading. Please wait.
Published byAshlie Harrell Modified over 9 years ago
1
Krishna Sattiraju CS 792.NET
2
Overview What is XML Encryption Methods for Encryption Storage of Encrypted Data Benefits of XML Secure Storage Types of XML Encryption
3
XML Encryption Specification that defines how to encrypt data Used to encrypt data, keying information and algorithms
4
Methods for encryption Using Symmetric Encryption Combination of Symmetric and Asymmetric Encryption X.509 Certificates
5
Storage of Encrypted Data Whole element is replaced with an element named Only the data in the element is replaced and its name remains readable in the document
6
XML Document Code
7
Encrypted Code
8
Asymmetric XML Encryption and Decryption o Select XML Element o Encrypt element o Encrypt Session Key o Create Encrypted Data element o Replace Original element o Select Encrypted Data element o Decrypt Session Key o Decrypt Cipher Data using unencrypted symmetric o Replace the Encrypted Data Element
9
Name Spaces System. XML System.Security. Cryptography System.Security.Cryptography.xml
10
Benefits of XML Secure Storage XML Is Structured Format Allows for secure storage of documents Provides granularity Leverages Existing technologies
11
XML Encryption Encrypted data is maintained. All information needed to decrypt a document is contained within the document. Session can be secured on the document level and shared between multiple parties. Sensitive data is easily interchanged between applications.
12
XML Encryption of Element John Smith A23B45C56
13
XML Encryption using Content John Smith A23B45C56
14
Encrypting XML Content (Character Data) John Smith A23B45C56 Example Bank 04/02
15
XML Encryption in WS- Security <env:Envelope xmlns:env="http://www.w3.org/2001/12/soap-envelope" xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"> <wsse:Security xmlns:wsse="http://schemas.xmlsoap.org/ws/2002/04/secext">...
16
XML Encryption w/ Digital Certificate <EncryptedData xmlns="http://www.w3.org/2001/04/xmlenc#"http://www.w3.org/2001/04/xmlenc Type="http://www.w3.org/2001/04/xmlenc#Element"> <EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#tripledes-cbc"/> rsakey.pem IPiEu9Nv+EsGyvV... xrfPSA+BEI+8...
17
XML Signing AND XML Encryption Order of Cryptographic operations matters Signing and Encrypting Encrypting and Signing Change of the order while Decrypting - Danger
18
References XML Encryption by By: Derek Smyth : http://dotnetslackers.com/articles/xml/XMLEncryption.aspxDerek Smyth http://dotnetslackers.com/articles/xml/XMLEncryption.aspx XML Encryption Syntax and Processing By Takeshi Imamura, Blair Dillaway, Ed Simon http://www.ibm.com/developerworks/xml/library/x- encrypt2/ http://www.ibm.com/developerworks/xml/library/x- encrypt2/ http://www.devx.com/dotnet/Article/21564 http://www.devx.com/dotnet/Article/21564
19
Thank You!!!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.