Xml Security using Xml Encryption and Xml Digital Signature

The subject of XML security is quite over-hyped. The whole idea of XML security can be simply described as applying common-sense security technology to a specific format, known as XML. XML security is classically described as a combination of XML Encryption and XML Digital Signature. We shall review these concepts in this article.

XML Encryption

The most interesting part about XML encryption is that we can encrypt an entire document, or its selected portions. This is very difficult to achieve in the non-XML world. We can encrypt one or all of the following portions of an XML document:

  • The entire XML document
  • An element and all its sub-elements
  • The content portion of an XML document
  • A reference to a resource outside of an XML document

The steps involved in XML encryption are quite simple, and are as follows:

1. Select the XML to be encrypted (one of the items listed earlier, i.e. all or part of an XML document).
2. Convert the data to be encrypted in a canonical form (optional).
3. Encrypt the result using public key encryption.
4. Send the encrypted XML document to the intended recipient.

The following a sample XML document, containing the details of a credit card of a user

<?xml version=’1.0’?>
<PaymentInfo xmlns=’http://mybank.org’>
   <Name> John Smith <Name/>
   <CreditCard Limit=’10000’ Currency=’USD’>
          <Number> 1617 1718 0181 9910 </Number>
          <Issuer> Master </Issuer>
          <Expires> 05/05 </Expires>
   </CreditCard>
</PaymentInfo>

We shall not describe the various details of this XML document, and would simply remark that it contains the credit card details, such as the user’s name, credit limit, currency, card number, issuer name and expiry details. Let us assume that we want to encrypt this. When we perform XML encryption, a standard tag called as EncryptedData comes into picture. As we have mentioned before, we can choose to encrypt selected portions of the XML document, or we can encrypt it as a whole. For illustration purposes, we shall see what happens when we encrypt only the actual credit card details (such as its number, issuer and expiry details). The result is shown in the figure below. We can see that the encrypted text is embedded inside the tag CipherData. This is another standard tag in XML encryption.


<?xml version=’1.0’?>
<PaymentInfo xmlns=’http://mybank.org’>
   <Name> John Smith </Name>
   <CreditCard Limit=’10000’ Currency=’USD’>
   <EncryptedData Type =
          http://www.w3.org/2001/04/xmlenc#Content’ xmlns=’http://www.w3.org/2001/04/xmlenc#’>
          <CipherData>
                  <CipherValue>D7T60UB67 </CipherValue>
          </CipherData>
   </EncryptedData>
   </CreditCard>
</PaymentInfo>

As we can see, the credit card details are now encrypted, and therefore, cannot be read/changed. The fact that we have encrypted the contents of the XML document is signified by using the xmlenc#Content value. If we had encrypted the full CreditCard element, this would have been changed to xmlenc#Element.

XML Digital Signature
As we can see, a digital signature is calculated over the complete message. It cannot be calculated only for specific portions of a message. The simple reason for this is that the first step in a digital signature creation is the calculation of the message digest over the whole message. Many practical situations demand that users be able to sign only specific portions of a message. For instance, in a purchase request, the purchase manager may want to authorize only the quantity portion, whereas the accounting manager may want to sign only the rate portion. In such cases, XML digital signatures can be used. This technology treats a message or a document as consisting of many elements, and provide for the signing of one or more such elements. This makes the signature process flexible and more practical in nature.

The XML digital signature specification defines a number of XML elements, which describe the characteristics of an XML signature. These are tabulated below.

Element Description
SignedInfo Contains the signature itself (i.e. the output of the signing process).
CanonicalizationMethod Specifies the algorithm used to canonicalize the SignedInfo element, before it is digested as a part of the signature creation.
SignatureMethod Specifies the algorithm used to transform the canonicalized SignedInfo element into the SignatureValue element. This is a combination of a message digest algorithm and key-dependent algorithm.
Reference Includes the mechanism used for calculating the nessage digest and the resulting digest value over the original data.
KeyInfo Indicates a key that can be used to validate the digital signature. This can consist of digital certificates, key names, key agreement algorithms used, etc.
Transforms Specifies the operations performed before calculating the digest, such as compression, encoding, etc.
DigestMethod Specifies the algorithm used to calculate the message digest.
DigestValue Contains the message digest of the original message.

Page 1 of 2

The steps in performing XML digital signatures are as follows.

1. Create a SignedInfo elementwith SignatureMethod, CanonicalizationMethod and References.

2. Canonicalize the XML document.

3. Calculate the SignatureValue, depending on the algorithms specified in the SignedInfo element.

4. Create the digital signature (i.e. Signature element), which also include sthe SignedInfo, KeyInfo and SignatureValue
elements.

A simplistic example of a XML digital signature is shown below. We shall also explain the important aspects of the signature.

<Signature>
   <SignedInfo>
      <SignatureMethod Algorithm="xmldsig#rsa-sha1"/>
   </SignedInfo>
   <SignatureValue>
    0WjB5MQswCQYDVQQGEwJJTjEOMAwGA1UEChMFaWZsZXgxDDAKBgNV     WMBQGCgmSJomT8ixkAQETBnNlcnZlcjETMBEGA1UEAxMKZ2lyaVNlcnZlcjEf
    GCSqGSIb3DQEJARYQc2VydmVyQGlmbGV4LmNvbTCBnzANBgkqhkiG9w0B     BjQAwgYkCgYEArisLROwIrIVxu/Mie8q0rUCQ5GtqMBWeJtuJM0vn2Qk5XaWc
    y1nJ/zc90v7qSx33X/sW5aRJph1ApOvPArQhK9PAyPhCcCIUEOvUYnxFmu8YE9U
   </Signaturevalue>
</Signature>

Let us discuss the contents of the digital signature in brief.

  • <Signature> … </Signature> – This block identifies the start and end of the XML digital signature.
  • <SignedInfo> … </SignedInfo> – This block specifies the algorithm used: firstly for calculating the message digest (which is SHA-1, in this case) and then for preparing the XML digital signature. (which is RSA, in this case).
  • <SignatureValue> … </SignatureValue> – This block contains the actual XML digital signature.

XML digital signatures can be classified into three types: enveloped, enveloping and detached.

  • In the enveloped XML digital signatures, the signature is inside the original document (which is being digitally signed).
  • In the enveloping XML digital signatures, the original document is inside the signature.
  • A detached digital signature has no enveloping concept at all, it is separate from the original document.

This idea is shown below.


Enveloped Signature
      <Original_document>
            <Signature> … </Signature>
      </Original_document>

Enveloping Signature
      <Signature>
            <Original_document>
            </Original_document>
      </Signature>

Detached Signature
       <Original_document>
       </Original_document>
       <Signature>
       </Signature>

To summarize, XML security can be very easily understood by applying the basic knowledge of security concepts in the context of XML.

atul kahate

About the author :
Atul Kahate is Head – Technology Practice, PrimeSourcing (the The Global IT Services business from i-flex solutions limited). He has authored 16 books on Information Technology, 2 on cricket, and over 1500 articles on both of these in various newspapers/journals. He can be reached at akahate at gmail dot com.

Page 2 of 2

The following two tabs change content below.
Atul Kahate
Atul Kahate is Head - Technology Practice, Oracle Financial Services Software Limited (formerly i-flex solutions limited). He has authored 20 books on Information Technology, 2 on cricket, and over 2000 articles on both of these in various newspapers/journals. Web: AtulKahate.com. Email at akahate@gmail.com
Atul Kahate

Atul Kahate

Atul Kahate is Head - Technology Practice, Oracle Financial Services Software Limited (formerly i-flex solutions limited). He has authored 20 books on Information Technology, 2 on cricket, and over 2000 articles on both of these in various newspapers/journals. Web: AtulKahate.com. Email at akahate@gmail.com

  • Chandanmsc

    how to calculate signature value…..
    …………….how to calculate this data……………
    Can you show some java program that claculte this value in XML

  • Jaydipsinhg

    how to calculate signature value…..
    …………….how to calculate this data……………

  • Jaydipsinhg

    Que:how to calculate SignatureValue ???

  • GUEST

    Great presentation. Thank you!