Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
XML encryption full report
Post: #1


As XML becomes a predominant means of linking blocks of information together, there is a requirement to secure specific information. That is to allow authorized entities access to specific information and prevent access to that specific information from unauthorized entities. Current methods on the Internet include password protection, smart card, PKI, tokens and a variety of other schemes. These typically solve the problem of accessing the site from unauthorized users, but do not provide mechanisms for the protection of specific information from all those who have authorized access to the site.
Now that XML is being used to provide searchable and organized information there is a sense of urgency to provide a standard to protect certain parts or elements from unauthorized access. The objective of XML encryption is to provide a standard methodology that prevents unauthorized access to specific information within an XML document.
XML (Extensible Markup Language) was developed by an XML Working Group (originally known as the SGML Editorial Review Board) formed under the auspices of the World Wide Web Consortium (W3C) in 1996. Even though there was HTML, DHTML AND SGML XML was developed byW3C to achieve the following design goals.
¢ XML shall be straightforwardly usable over the Internet.
¢ XML shall be compatible with SGML.
¢ It shall be easy to write programs, which process XML documents.
¢ The design of XML shall be formal and concise.
¢ XML documents shall be easy to create.
2.1 Why XML
XML was created so that richly structured documents could be used over the web. The other alternate is HTML and SGML are not practical for this purpose.HTML comes bound with a set of semantics and does not provide any arbitrary structure. Even though SGML provides arbitrary structure, it is too difficult to implement just for web browser. Since SGML is so comprehensive that only large corporations can justify the cost of its implementations.

2.2 XML Definition
The eXtensible Markup Language, abbreviated as XML, describes a class of data objects called XML documents and partially describes the behavior of computer programs which process them. Thus XML is a restricted form of SGML
2.3 Documents
A data object is an XML document if it is well-formed, as defined in this specification. A well-formed XML document may in addition be valid if it meets certain further constraints.Each XML document has both a logical and a physical structure. Physically, the document is composed of units called entities. An entity may refer to other entities to cause their inclusion in the document. A document begins in a "root" or document entity
A textual object is a well-formed XML document if It meets all the well-formedness constraints :Each of the parsed entities which is referenced directly or indirectly within the document is well-formed.
Document ::= Prolog element Misc*

2.4 Element Type Declarations
The element structure of an XML document may, for validation purposes, be constrained using element type and attribute-list declarations. An element type declaration constrains the element's content. Element type declarations often constrain which element types can appear as children of the element. At user option, an XML processor may issue a warning when a declaration mentions an element type for which no declaration is provided, but this is not an error.
Element Type Declaration
elementdecl ::= '<!ELEMENT' Name contentspec '>'
contentspec ::= 'EMPTY' | 'ANY' | Mixed | children
XML is a major enabler of what the Internet, and latterly Web services, require to continue growing and developing. Yet a lot of work remains to be done on security-related issues before the full capabilities of XML languages can be realized. Traditional methods of establishing trust between parties aren't appropriate on the public Internet or, indeed, on large LANs or WANs. There are particular difficulties in dealing with hierarchical data structures and with subsets of data with varying requirements as to confidentiality, access authority, or integrity. In addition, the application of new standard security controls differentially to XML documents is not at all straightforward .
At present, encrypting a complete XML document, testing its integrity, and confirming the authenticity of its sender is a straightforward process. But it is increasingly necessary to use these functions on parts of documents, to encrypt and authenticate in arbitrary sequences, and to involve different users or originators. At present, the most important sets of developing specifications in the area of XML-related security are XML encryption, XML signature; XACL, SAML, and XKMS This article introduces XML encryption and XML signature
Encryption: This ensures that your data was unable to be read or utilized by any party while in transit. Your message is encrypted into incomprehensible gibberish before it leaves your computer. It maintains it encrypted (gibberish) state during it's travel through the Internet. It is not de-crypt until the recipient receives it. Because of the public-key cryptography used (discussed later) only the recipient can decipher the received message, no one else can.
3.1 How does it all work
To understand how this all works, we need to start with the basics. Encryption has been around for centuries, Julius Caesar used encrypted notes to communicate with Rome thousands of years ago. This traditional cryptography is based on the sender and receiver of a message knowing and using the same secret key: the sender uses the secret key to
encrypt the message, and the receiver uses the same secret key to decrypt the message. 21 years ago, a revolution happened in cryptography that changed all this, public-key cryptography. In 1976, Whitfield Diffie and Martin Hellman, introduced this new method of encryption and key management. A public-key cryptosystem is a cryptographic system that uses a pair of unique keys (a public key and a private key). Each individual is assigned a pair of these keys to encrypt and decrypt information. A message encrypted by one of these keys can only be decrypted by the other key in the pair.
The public key is available to others for use when encrypting information that will be sent to an individual. The private key is accessible only to the individual. The individual can use the private key to decrypt any messages encrypted with the public key. Similarly, the individual can use the private key to encrypt messages, so that the messages can only be decrypted with the corresponding public key.
Several bodies are actively involved in examining the issues and in developing standards. The main relevant developments here are XML encryption and the related XML signature, eXtensible Access Control Language (XACL), and the related Security.

4.1 Block Encryption Algorithms
Block encryption algorithms are designed for encrypting and decrypting data in fixed size, multiple octet blocks. Their identifiers appear as the value of the Algorithm attributes of EncryptionMethod elements that are children of EncryptedData. Block encryption algorithms take, as implicit arguments, the data to be encrypted or decrypted, the keying material, and their direction of operation. For all of these algorithms specified below, an initialization vector (IV) is required that is encoded with the cipher text.
4.1.1 Padding
Since the data being encrypted is an arbitrary number of octets, it may not be a multiple of the block size. This is solved by padding the plain text up to the block size before encryption and unpadding after decrytion. The padding algorithm is to calculate the smallest non-zero number of octets, say N, that must be suffixed to the plain text to bring it up to a multiple of the block size. We will assume the block size is B octets so N is in the range of 1 to B. Pad by suffixing the plain text with N-1 arbitrary pad bytes and a final byte whose value is N. On decryption, just take the last byte and, after sanity checking it, strip that many bytes from the end of the decrypted cipher text.
For example, assume an 8 byte block size and plain text of 0x616263. The padded plain text would then be 0x61626305 where the "" bytes can be any value.
4.2 Stream Encryption Algorithms
Simple stream encryption algorithms generate, based on the key, a stream of bytes which are XORed with the plain text data bytes to produce the cipher text on encryption and with the cipher text bytes to produce plain text on decryption. They are normally used for the encryption of data and are specified by the value of the Algorithm attribute of the EncryptionMethod child of an EncryptedData element.

The following requirements for XML Encryption were defined:
1. Users of an XML document that has encrypted content must be authorized. The processing system must be able to distinguish between authorized users and unauthorized users.
2. There must be a means of individually encrypting elements within a single XML instance.
3. XML content should be encrypted at creation of the XML document instance. XML document instances with encrypted elements should be saved encrypted when external to the repository.
4. Elements with encrypted content must also be encrypted in any instance of the XML documents such that only authorized users can decrypt the encrypted content.
5. The XML document should not require modification when an authorized user is added, deleted or modified.
6. Must not interfere with the ability to digitally sign the document.
1. Organizations typically define multiple categories when classifying the security requirements for their information. Banks have stringent security standards and typically define three broad categories:
a. Public “ on disclosure no damage is done;
b. Confidential “ on disclosure damage is minor and usually contained to an individual or causes minor financial loss; and
c. Sensitive “ on disclosure damage is severe, may put national interests at risk or may cause great financial losses.
2 There must be a way of designating an element or group of elements that needs to be protected without changing the original element or structure of the document (DTD);
3 XML documents on the web may be retrieved through a variety of methods such as FTP, HTTP, HTTPS, e-mail, file sharing (directories), etc.
The Tokyo Research Lab has created the XML Security Suite, a prototype implementation of the XML signature specification. The XML Security Suite, available from IBM's alphaWorks, contains utilities to automatically generate XML digital signatures. When sending secure data across the Web, you need four things:
a. Confidentiality -- No one else can access or copy the data.
b. Integrity -- The data isn't altered as it goes from the sender to the receiver.
c. Authentication -- The document actually came from the purported sender.
d. Non-repudiability -- The sender of the data cannot deny that they sent it, and they cannot deny the contents of the data.
XML has become a valuable mechanism for data exchange across the Internet. SOAP, a means of sending XML messages, facilitates process intercommunication in ways not possible before. Traditional methods of establishing trust between parties aren't appropriate on the public Internet or, indeed, on large LANs or WANs. In addition, the application of now standard security controls differentially to XML documents is not at all straightforward. An XML document, like any other, can be encrypted in its entirety and sent securely to one or more recipients. This is a common function of SSL or TLS, for example, but what is much more interesting is how to handle situations where different parts of the same document need different treatment. A valuable benefit of XML is that a complete
document can be sent as one operation and then held locally, thus reducing network traffic. But this then raises the question of how to control authorized viewing of different groups of elements. A researcher may need to be prevented from seeing personal details on medical records while an administrator may need exactly those details but should be prevented from viewing medical history; a doctor or nurse, in turn, may need medical details and some, but not all, personal material.
As with general encryption, there's no problem in digitally signing an XML document as a whole. However, difficulty arises when parts of a document need to be signed, perhaps by different people, and when this needs to be done in conjunction with selective encryption. signer view the item to be signed in plain text, and this may mean decrypting part of something already encrypted for other reasons. In other cases, data that is already encrypted may be encrypted further as part of a larger set.
There are additional problems, as well. One of the strengths of XML languages is that searching is clear and unambiguous: The DTD or schema provides information as to the relevant syntax. If a document subsection, including tags, is encrypted as a whole, then the ability to search for data relevant to those tags is lost. The core element in the XML encryption syntax is the Encrypted Data element which, with the Encrypted Key element, is used to transport encryption keys from the originator to a known recipient, and derives from the Encrypted Type abstract type. When an element or element content is encrypted, the Encrypted Data element replaces the element or content in the encrypted version of the XML document.
Though it is conceivable that XML Encryption could be used to encrypt any type of data, encryption of XML-encoded data is of special interest. This is because XML's ability to capture the structure and semantics of data unleashes new applications for the area of encryption. To this end, an important design consideration is to not encrypt more of an XML instance's structure and semantics than is necessary.
For example, suppose there is an XML instance containing a list of customers including their names, addresses, and credit card numbers. A contracted marketing employee may be entrusted to see the names and addresses but must not see the credit card number. If an application knows it should just be decrypting the content of <name> elements, the XML instance needs to maintain its structure identifying what is a "name" and what isn't. Otherwise the application would have to decrypt the other data just to find out what it was supposed to be decrypting .
The centerpiece of XML Encryption is the <EncryptedNode> element. It has an attribute, NodeType, which indicates the type of node that was encrypted: element, element content, attribute, or attribute value. The encrypted node appears as a base64-encoded string, which forms the content of the <EncryptedNode> element.
Algorithm and keying information are captured in the <EncryptionInfo> element. Each <EncryptedNode> element has an associated <EncryptionInfo> element. The association my be accomplished by Pointing to the <EncryptionInfo> element through the EncryptionInfo attribute of the <EncryptedNode> element
When encrypting, applications create the <EncryptionInfo> element to store the information necessary for decryption. Multiple <EncryptedNode> elements may share a single <EncryptionInfo> element.
7.1 Proposed Approach
The objective of XML is to use a structured approach to provide searchable content in documents. The problem with using an element for encryption is that it does not promote an understanding of the structure of the document which could lead to confusion and not permit the ability to search the structure or specific content based on tags. If we have multiple elements that need encrypting we lose the ability to search these elements using the elements of the structure of the DTD or schema.
In the interest of maintaining the existing structure of documents and not have to create a special element for encryption that may not promote understanding/search ability within the structure of the document it is proposed that W3C XML Encryption use element attributes to describe elements that should be protected. In this way multiple levels of classification could be assigned to elements within a document.
7.2 A Sample Document “ Medical XML
XML medical record document has confidential and sensitive information divided into four basic components (I could have created four different security classifications but decided to use only two for this example):
1) Personal information - name, address etc about the person - confidential
2) Billing information - credit card, history - confidential
3) Medical characteristics - age, height, weight, etc - sensitive
4) Medical history - case information - sensitive
XSL document, Med7.xsl, is used to display the desired content . The level of security in this sample could be mapped to three different requirements:
1) doctor - who needs to see all the information
2) billing clerk - who needs to see the personal and billing information only
3) researcher - who needs to see the medical characteristics and history only.
The point of encrypting the content relates to the ability to send the information via e-mail and maintain the confidentiality of the information until it reaches the destination (users system) and the user decrypts the information. This is as opposed to SSL which decrypts the information at the server and the information is then unencrypted, internal to the organization where is has the potential of being intercepted.
7.2.1 XML Document “ Patient Medical Record
The XML document has four parts that need to be protected from unauthorized access. These are identified by using class = Ëœconfidential |
sensitiveâ„¢. In this sample the data would be extracted from a protected
database and encrypted using a symmetric key(s) prior to being inserted into the XML instance. Access controls could be PKI, PGP, flat file (another XML document) or a database. A program or script will be required to link the user to the access requirements and encrypt the symmetric key with the users public key or some other method of ensuring unique and secure transport of the encrypted content. The sample below provides a high level view of the file without getting into the details of how the encryption and access controls are done.
7.2.3 Sample XML Medical Record File
<xml version="1.0" encoding="UTF-8" >
<!-- program to look at ACL (Access Control List either LDAP, PGP, file or Database) to determine authorized users and access requirements, encrypts confidential key and/or sensitive key with public key (asymmetric key) or some other means to uniquely identify the user and access control-->
<Personal class="confidential">
<Street1>100 Bent Road</Street1>
<city>Los Angeles</city>
<Billing_Information class="confidential">
<Credit_card class="confidential">
<card_type class="confidential">VISA</card_type>
<card_number class="confidential">4404 5505 6606 7707</card_number>
<Account_history class="confidential">Invoice Number 124 amount $2,000 Paid VISA</Account_history>
<Medical_characteristics class="sensitive">
<Medical_history class="sensitive">
<CASE class="sensitive">
<Symptom class="sensitive">stomach craps, vomiting, drowsy, incoherent</Symptom>
<Treatment class="sensitive">Pumped stomach, overdose of sleeping pills</Treatment>
7.2.4 XSL Sample Stylesheet
The XSL stylesheet demonstrates that content can be hidden based on the security classification of the information. In this case the sensitive information will not be displayed.
<xml version='1.0'>
<!-- access control program to authenticate authorized user and use access control requirements within XSL stylesheet to determine what the user is allowed to see-->
<xsl:stylesheet xmlns:xsl=''>
<xsl:template match = "/MedicalRecord">
<HTML> <HEAD><TITLE>Medical Record</TITLE></HEAD>
<H2>Medical Records</H2>
<!-- XSL commands that use the access control parameters from the above access control program to determine access privileges of user and to remove any content that user is not authorized to see-->
<H3>Personal Information</H3>
<xsl:apply-templates select="Personal"/>
<font color="green">
<H3>Billing Information</H3>
<xsl:apply-templates select="Billing_Information"/>
<xsl:template match="Medical_characteristics[@class ='sensitive']"/>
<xsl:template match="Medical_history[@class ='sensitive']"/>
There are a number of key issues that must be addressed with XML Encryption:
1) Access control “ determine who is authorized to see what
2) Protection of content
8.1 Access Control
Access control should perform two functions:
- identify who has access
- determine what the authorized user can see
The creation step of XML would require some means of uniquely identifying the user(s) using some sort of Access Control List (ACL) that provides a number of key pieces of information such as:
¢ Contact information (e-mail or location
¢ Level of access (is the person authorized to see all)
¢ Unique identifier (ensures that that person is uniquely identified)
8.2 Protection of Data
Sensitive or confidential information should be protected at all times outside the source. At creation of the XML instance the content that
is deemed confidential or sensitive should be encrypted prior to insertion into the instance. In the example the data would be encrypted using a symmetric key or keys depending on the number of levels of security required. The encrypted information within the created instance should remain encrypted when the user is not viewing the information. It should be saved in encrypted format to remove the risk of having the content available to unauthorized users in the event that the authorized user leaves his/her workstation unattended or the system is lost or stolen.
The examples in this section illustrate how XML Encryption would work in a variety of scenarios.
9.1 Encrypt an entire element
The plaintext:
<ElementToBeEncrypted Attr1="Value1" Attr2="Value2" ...>
when secured becomes
<EncryptionInfo xmlns="
<EncryptionInfo>...<EncryptedNode xmlns=""
NodeType="Element" EncryptionInfo="#encryptionInfo23">
(Base64 of encrypted Element node)
</EncryptedNode> ...</root>
9.2 Encrypt content of an element but not the element itself
Scenario: As mentioned earlier, in many applications it makes sense NOT to unnecessarily encrypt the structure and semantics of an XML instance. In this case, an application wants to keep secret just the content of an element.
...<EncryptionInfo xmlns="
Id="encryptionInfo23"...> </EncryptionInfo>
...<Element Attr1="Value1" Attr2="Value2" Attr3="Value3">
<EncryptedNode xmlns="" NodeType="ElementContent" EncryptionInfo="#encryptionInfo23">
(Base64 of encrypted element content)

The XML Encryption specification must include a discussion of potential vulnerabilities and recommended practices when using the defined processing model in a larger application context. While it is impossible to predict all the ways an XML Encryption standard may be used, the discussion should alert users to ways in which potentially subtle weaknesses might be introduced.
At a minimum, the following types of vulnerabilities must be addressed.
1. Security issues arising from known plain-text and data length information An attacker may know the original structure of the plain text via its schema. An attacker may know the length and redundancy of the plain-text data.
2. Processing of invalid decrypted data if an integrity checking mechanism is not used in conjunction with encryption.
3. Potential weaknesses resulting from combining signing and encryption operations.
4. Sign before you encrypt: the signature may reveal information about the data that has now been encrypted unless proper precautions are taken (such as properly adding an encrypted random string to the plaintext before hashing).
5. The specification should warn application designers and users about revealing information about the encrypted data

Digital signatures use cryptographic techniques to protect the integrity of information. The key used to sign data is typically controlled by a single entity and so the creation of a signature can be directly traced to the owner of the key. The validation of a signature includes not only the cryptographic processing, but also the determination that a key was trusted to sign a specific piece of information. The trust in a key is determined by the validation of other signed statements, or certificates, that describe the appropriate usage of the public key.
XML Digital Signature provides integrity, message authentication, and/or signer authentication services for data of any type, whether located within the XML that includes the signature or elsewhere.
XML Security Library supports all MUST/SHOULD/MAY features and algorithms described in the W3C standard and provides API to sign prepared document templates, add signature(s) to a document "on-the-fly" or verify the signature(s) in the document.
XML Digital Signature Online Verifier is an example of a real application based on XML Security Library. Using this tool you can verify any XML Signature and get detailed report on what and how was signed.

11.1 How is the validity of an XML digital signature determined
The following steps determine the cryptographic correctness of a digital signature:
1) Use the cryptographic algorithm parameter definitions in the signature to determine: the appropriate hash algorithm, signature algorithm, signature format, asymmetric algorithm parameters and public key to use in the validation process.
2) Use the appropriate hash algorithm on a canonical representation of the signed data.
3) Use the appropriate algorithms and public key to create a digital signature over the hashed information.
4) Compare the newly computed signature to the attached signature. The validation fails at this point if they are not the same.
5) Determine if the public key used to create the signature was trusted for this specific signature application.

11.2 Recommendations
Signed XML should provide a means to not only sign a resouce, but to also carry information that supports the evaluation of the signature semantics. Signed XML should provide mechanisms to support the complete validation of digital signatures. This validation needs to include the processing of constraints on key usage specific to an application. These constraints are best expressed in XML.
XML encryption thus has a wide variety of uses and applications. The first and the foremost thing to remember about XML encyption is that it provides an hirrarchical level of security as we have already seen.the elements or the entities can be classified on the basis of their level of security and can authenicated to acess for authorised users.although not a complete picture has been developed bout its appilcations in the field of digital signature and other applications researches have been going on.

I express my sincere gratitude to Prof. M.N Agnisarman Namboothiri ( Head Of Department ,Information Technology ) and Mr. Zaheer P.C, Ms. Deepa (Staff in charge ) for their kind co-operation for the seminars presentation .
I am also grateful to all other faculty members of Information Technology Department and my colleagues for their guidance and encouragement .


Block Encryption Algorithms
Stream Encryption Algorithms
Post: #2
i need xml encryption seminars topic............
i need pdf,ppt
Post: #3
the report posted above can be copied and pasted to create a pdf yourself. The ppt:
Post: #4
i need signcryption pdf and ppt
Post: #5
Thank you vary much.
Post: #6
Charles Zhenwei occasion don't bring back. Enrollees concept that pursuit of excellence he may turn out to be excessive caused by requirements, subsequent to unexpectedly through slipups vent attachments, i doubt any earnestly. Startlingly, a subsequent afternoon what is the news got here some bolt out of your green: investigate Zhenwei found a vehicle accident, also now a medical facility.
Bob on the blooming flowers , shaking red nine ileum mentality ; Afar Nver , smoked drunk last night carousing burlesque .
Well, you age is still small , a lot of things that do not understand , I tell you, knowledge is useful , in order to have a foothold in the future society, rely on knowledge, such as ...... Xing water looked around and finally found a straw - Zhaolao " ? such as Zhao 's boyfriend , small study hard , go to college , and now ...... hey , Xiao Zhao , your boyfriend in which units work ah ," answered the rise Zhaolao Xing water a supercilious , addition and then nothing else. Hing big water hurts , but his career has long been tempered into a steel , Hing water almost two seconds less time to extricate himself from embarrassment , continue solemn teachings continues, " too many examples of this , such as ...... such as the previous Zheng teach you algebra teacher , the educated , and now the development of much good, not only conducive to the country , personally ...... . "
Post: #7
Afternoon types and additionally trainers the very next day Document acquired get out of about not enough, decided on look at white stones, pictures head off to an individual's family home downstairs. Great little feet receive big, constantly Document scarcely talk to your the dog, still at this time individuals decided on an individual's family home, what can Document tell you the software. Is normally filled pictures hesitated, only just white stones your mom went place right from succeed, and additionally Document experienced crying loading off, acquired great grip and additionally plucked on an individual's place, guy, you¡¯re able to can be bought, Now i'm equally not likely help, you will benefit others tell white stones, have the dog go back to class, and additionally I had Meizhe an individual's parent, to door, and therefore the white stones is normally this intend of the fact that home That's why, I presume he has really been greetings, you will benefit auntie right. Document nodded and additionally reckoned, an individual's the new mom previously had basically no concept that people are competitors and not just contacts.
I gently pulled out a reed tidbits in the hand , it was like a beautiful snowflake wizard , sober and elegant , people can not help but want to get close to it.
He was sad to leave the dream of the country, exiled him , met him in the winter now teacher.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: who is collins tuohy boyfriend, bongosri latterly, seminar topics xml encryption ppt, what is the teachings of the, who is julius nyerere, my boyfriend, 10 teachings of the,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  imouse full report computer science technology 3 3,638 17-06-2016 12:16 PM
Last Post: ashwiniashok
  computer networks full report seminar topics 7 4,907 25-05-2016 02:07 PM
Last Post: dhanyavp
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 5,002 10-05-2016 12:21 PM
Last Post: dhanyavp
  Optical Computer Full Seminar Report Download computer science crazy 43 34,295 29-04-2016 09:16 AM
Last Post: dhanyavp
  ethical hacking full report computer science technology 41 46,803 18-03-2016 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 2,109 27-02-2016 12:32 PM
Last Post: Prupleannuani
  Data Encryption Standard (DES) seminar class 2 1,846 20-02-2016 01:59 PM
Last Post: seminar report asees
  steganography full report project report tiger 15 19,493 11-02-2016 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 14,063 16-09-2015 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 12,251 01-05-2015 03:36 PM
Last Post: seminar report asees