XML Encryption Syntax and Processing

WG Working Draft 12-Mar-2001

This version:
http://www.w3.org/Encryption/2001/03/12-proposal.html
Latest version:
...
Previous version:
This draft is based on the 15-December-2000 Proposal [prop3] by Dillaway, Fox, Imamura, LaMacchia, Maruyama, Schaad, and Simon.
Editors
...
Authors
Reagle, Dillaway, ...
Contributors
...

Abstract

This document specifies a process for encrypting data and representing the result in XML. The data may be arbitrary binary data, an XML document, or an XML element. When an element is encrypted, the element is replaced with an XML Encryption element. Otherwise, the enryption element serves as the root of the new document.

Status of this document

This is an editors' copy that has absolutely no standing.

Table of Contents

  1.  

1.0 Introduction

This document specifies a process for encrypting data and representing the result in XML. The data may be arbitrary binary data, an XML document, or an XML element. When an element is encrypted, the element is replaced with an XML Encryption element. Otherwise, the enryption element serves as the root of the new document.

1.1 Editorial and Conformance Conventions

This specification uses XML Schemas [XML-schema] to describe the content model.

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this specification are to be interpreted as described in RFC2119 [KEYWORDS]:

"they MUST only be used where it is actually required for interoperation or to limit behavior which has potential for causing harm (e.g., limiting retransmissions)"

Consequently, we use these capitalized keywords to unambiguously specify requirements over protocol and application features and behavior that affect the interoperability and security of implementations. These key words are not used (capitalized) to describe XML grammar; schema definitions unambiguously describe such requirements and we wish to reserve the prominence of these terms for the natural language descriptions of protocols and features. For instance, an XML attribute might be described as being "optional." Compliance with the XML-namespace specification [XML-NS] is described as "REQUIRED."

1.2 Design Philosophy

The design philosophy and requirements of this specification are addressed in the XML Encryption Requirements document [EncReq].

1.3 Versions, Namespaces and Identifiers

No provision is made for an explicit version number in this syntax. If a future version is needed, it will use a different namespace. The experimental XML namespace [XML-NS] URI that MUST be used by implementations of this (dated) specification is:

   xmlns="http://www.w3.org/Encryption/2001/03/xmlenc#"

Additonally, this specification makes use of the XML Signature [XMLDSIG] namespace and schema definitions

   xmlns:ds=’http://www.w3.org/2000/09/xmldsig#’

This namespace is also used as the prefix for algorithm identifiers used by this specification. While applications MUST support XML and XML namespaces, the use of internal entities [XML] or our "enc" XML namespace prefix and defaulting/scoping conventions are OPTIONAL; we use these facilities to provide compact and readable examples.

1.4  Acknowledgements

The contributions of the following working group members to this specification are gratefully acknowledged:

...

2.0 Encryption Overview and Examples

This section provides an overview and examples of XML Encryption syntax. The formal syntax is found in Core Encryption Syntax (section 3); the specific processing is given in Processing Rules (section 4).

Data that is encrypted with this specification is removed, encrypted, encoded, and replaced as part of the content of an EncryptedData's element. This element has the following structure:

   <enc:EncryptedData Id="" Type="">
     <enc:EncryptionMethod/>?
       <enc:KeyInfo>
        <enc:EncryptedKey/>?
        <enc:KeyRetrievalMethod/>?
       </enc:KeyInfo>?
     <enc:CipherData URI="">iamscrambled</enc:CipherData>
   </enc:EncryptedData>

2.1 EncryptedData

This section could be interwoven in with an actual example very nicely, maybe those in the previous sectino 5. -- Reagle

EncryptedData replaces the part of an XML document that is encrypted, or serves as the root element of an XML document if a whole document (of any MIME type) is encrypted. In either case, the location of this element serves to clearly identify the location of the data that was encrypted and the location of the information necessary to decrypt it. EncryptedData will always contain either the CipherData as a base64 encoded octet sequence or a URI reference and transformation instructions necessary to obtain the CipherData as an octet sequence. The latter mechanism is provided for flexibility and to support scenarios such as the encryption of a binary content stream where it would be inefficient to include the stream content directly in an XML document. 

The EncryptedData object may optionally contain information about how the CipherData may be decrypted. This can include the following:

To simplify encoding and processing, only a single CipherData may be included within an EncryptedData object. Also, it is implicit that all included information about the encryption key used will refer to the same key value. 

To meet the needs of key applications, this specification supports encryption of:

This "NodeList" needs to be investigated with respect to our processing model and using InformationSet terminology, maybe those in the previous sectino 5. -- Reagle.

The type of data encrypted may be encoded as an attribute of the EncryptedData to aid the decryptor in processing it. If the data is an XML Element, it is implicit the decrypted Element replaces the EncryptedData object in a given XML Document context. Similarly, a decrypted NodeList replaces the EncryptedData object in a given XML Document. An external octet sequence is always treated as external data relative to any XML Document, i.e., there is no implied document transform to be applied when the data is decrypted.

Each EncryptedData object is assumed to be independent and there is no requirement for indicating linkage or ordering between EncryptedData objects. We do recognize that an encryptor may choose an approach in which decryption order and/or state propagation between EncryptedData objects is important. For example, one may use the output from one decryption as the IV input to a second decryption. Or, if one has two EncryptedData objects which reference doubly encrypted external data, then the decryption order is critical. In such cases, the encryptor may specify this information as part of the encryption method information.

Data transformations, such as canonicalization or compression, are outside the scope of this specification as the requirements are application dependent.

2.2 Encryption Key Sharing

This section could be interwoven in with an actual example very nicely, maybe those in the previous sectino 5 -- Reagle

This specification's scope is limited to the (optional) conveyance of key information necessary to decrypt an EncryptedData. Anything beyond this simple exchange, (such as establishing trust relationships or negotiating pre-arranged secrets), is out of scope.

When specified, key sharing information is a first class object and encoded in a way that makes this obvious. For flexibility, we support specifying:

Depending upon the application, one may include one or more types of information within an Encrypted Data object. Typically, only one type of information will be necessary. All included key sharing information must refer to a single encryption key value. If encrypted key values for multiple recipients is included within an Encrypted Data object, we define a means of including hints as to which recipient is associated with an encrypted key value.  

Specification of key attributes is based on the existing KeyInfo Element defined in [XMLDSIG]. If one is using an asymmetric encryption algorithm, then the Digital Signature defined KeyInfo is adequate. If using a symmetric key, then we support indirect key references based on a key name and/or key references. To facilitate use of key names, we provide a means of associating a name with an encrypted key value. For key references, we define a KeyRetrievalMethod to express a URI where the key may be located. This similar to ds:RetrievalMethod but the type is always of EncryptedKey. Direct inclusion of a clear text symmetric key value is not relevant in this context and is not supported.

2.3 Encrypted Key

This section could be interwoven in with an actual example very nicely, maybe those in the previous sectino 5. -- Reagle

When specifying an encrypted symmetric key value, an EncryptedKey element is used. This is distinct from, and uses a different encoding from Encrypted Data, to avoid context dependent processing. The Encrypted Key object always includes the encrypted symmetric key CipherData as a base64 encoded octet sequence. In addition, the Encrypted Key object may include:

The latter capability is included primarily to support key update based on existing shared symmetric keys. 

2.4 Encrypted Data and Key Sharing Object Composition

The preceding sections identified some of the rules for combining encrypted data and key sharing information. This section provides a fuller treatment of this issue. 

EncryptedData may include an optional information about the key used to encrypt the CipherData. This can be either in the form of a KeyInfo element referencing a known key an Encrypted Key object or both.

An XML document may contain any number of Encrypted Key objects, either as children of an Encrypted Data object, or as independent objects. An Encrypted Key object may not be a child of another Encrypted Key object. The Encrypted Key object may include a KeyInfo Element with information to help the recipient decrypt the key CipherData. 

An Encrypted Key object may include references to Encrypted Data object or other Encrypted Key objects. In both cases, the reference indicates that the referenced object CipherData is encrypted using the key value contained with the referencing Encrypted Key object. As depicted below, references in the Encrypted Key-1 object indicate that the Encrypted Data-A CipherData and Encrypted Key-2 CipherData are encrypted using the symmetric key value in Encrypted Key-1.

2.4.1 super-encryption

An XML document may contain zero or more Encrypted Data objects. However, EncryptedData can not be the parent or child of another EncryptedData element -- though the data encrypted by this element can be anything, including EncryptedData and EncryptedKey elements (super-encryption). During super-encryption of an EncryptedData or EncryptedKey element, one must encrypt the entire element. Encrypting only the content of these elements, or encrypting selected child elements, will result in invalid XML against the schema defined in this specification.

For example, consider the following:

   <EncryptedData Id='1'>
     <KeyInfo/>?
     <CipherData>encypteddata</CipherData>
   <EncryptedData>

A valid super-encryption of this will result in

   <EncryptedData Id='2'>
     <KeyInfo/>?
     <CipherData>newencypteddata</CipherData>
   <EncryptedData>

where 'newencrypteddata' is the base64 encoding of the encrypted octet sequence resulting from encrypting the EncryptedData element with Id='1'.

Alternately, if one encrypted only the CipherData element of the original EncryptedData the result would be the invalid XML:

   <EncryptedData Id='1'>
     <KeyInfo/>?
     <CipherData>
     <EncryptedData Id='3'>
       <KeyInfo/>?
       <CipherData>differentencypteddata</CipherData>
       </CipherData>
     </EncryptedData>
   </EncryptedData>

3. Encryption Syntax

This section provides a detailed description of the syntax and features for XML Encryption. Features described in this section are mandatory to implement unless otherwise noted. The syntax is defined via [XML-Schema] with the following XML preamble, declaration, internal entity, and import:

  <?xml version='1.0'?>
  <!DOCTYPE schema PUBLIC "-//W3C//DTD XMLSCHEMA 200010//EN" "http://www.w3.org/2000/10/XMLSchema.dtd" [
     <!ATTLIST schema
               xmlns:ds CDATA   #FIXED 'http://www.w3.org/2000/09/xmldsig#'>
     <!ATTLIST schema
               xmlns:xenc   CDATA   #FIXED 'http://www.w3.org/2001/02/xmlenc#'>

    ]>
  <schema xmlns='http://www.w3.org/2000/10/XMLSchema' version='0.1'
          xmlns:ds='http://www.w3.org/2000/09/xmldsig#'
          xmlns:xenc='http://www.w3.org/Encryption/2001/03/xmlenc#'
          targetNamespace='http://www.w3.org/Encryption/2001/03/xmlenc#'
          elementFormDefault='qualified'>

  <import namespace='http://www.w3.org/2000/09/xmldsig#'
          schemaLocation='xmldsig-core-schema.xsd'/>

3.1 The EncryptedType

EncryptedType is the abstract type from which EncryptedData and EncryptedKey are derived. While these two latter element types are very similar with respect to their content models, a syntactical distinction is useful to processing.

  <complexType name='EncryptedType' abstract='true'>
    <sequence>
      <!-- this shows an enc:element being of ds:type -->    
      <element name='EncryptionMethod' type='ds:DigestMethodType' minOccurs='0'/>
      <!-- this shows a enc:type being extended from ds:type -->
      <element ref='xenc:KeyInfo' minOccurs='0'/>
      <element ref='xenc:CipherData'/>
    </sequence>
    <attribute name='Id' type='ID' use='optional'/>
  </complexType>

EncryptionMethod is an optional element that describes the encryption algorithm applied to the CipherData contained in this element. If the element is absent, the encryption algorithm assumed to be known by the recipient.

KeyInfo is an optional element, defined by [XMLDSIG], that carries information about the key used to encrypt the CipherData. The new elements defined by this specification that may appear a children of KeyInfo are described in the subsequent sections.

CipherData is a mandatory element that provides the encrypted data.

Id is an optional attribute providing for the standard method of assigning a string id to the element within the document context.

3.2 The CipherData Element

The CipherData is a mandatory element that provides the encrypted data. It may either contain the encrypted octet sequence as base64 encoded text or provide a reference to an external location (subject to the same processing rules as ds:TransformsType) containing the encrypted octet sequence.

   <element name='CipherData' type='ds:CryptoBinary'/>
or
   <element name="CipherData">
     <complexType>
       <choice>
         <element ref="ds:transforms" minOccurs="0"/>
       </choice>
     </complexType>
     <attribute name="URI" type="uriReference" use="required"/>
   </element>

This isn't valid schema. We need a schema construct that has the content (or a child with the content) of CryptoBinary, *or* a set of transforms. -- Reagle/Dillaway.

3.3 The EncryptedData element

The EncryptedData element is the core element in the syntax. Not only does its CipherData child contain the encrypted data, but it also the element that replaces the encrypted element, or serves as the new document root.

There are four different ways to define the key material to be used in decrypting the CipherData. In all cases, this information is contained within a KeyInfo element. They are:

  <element name='EncryptedData' type="xenc:EncryptedDataType"/>
  <complexType name='EncryptedDataType'>
    <complexContent>
      <extension base='xenc:EncryptedType'>
        <attribute name='Type' type='uriReference' use='optional'/>
      </extension>
    </complexContent>
  </complexType>

Type is an optional attribute identifying type information about the decrypted content. Valid values for this attribute are:

  1. Element — indicating that the encrypted data represents an XML element; specifically, it is the XML element that, before encryption, existed where the <EncryptedData> element now exists.
  2. ElementContent — indicating that the encrypted data represents the content of an XML element (or an entire XML document); specifically, the decrypted result will be a list of nodes representing the content of the XML element which is the parent of the <EncryptedData> element being processed. For an entire document, the decrypted result will be a list of nodes including the prolog and root element.
  3. media type — indicating that the encrypted data represents arbitrary data with the stated media type. For example if the encrypted data represents an HTML document, the value of the Type attribute would be "text/html", of if the encrypted data was a GIF file, the value of the Type attribute would be "image/gif". It is recommended that applications use defined MIME type strings when appropriate.

3.3 Extensions to ds:KeyInfo Element

This specification defines two elements that may be used as children of the ds:KeyInfo element. These are the EncryptedKey and KeyRetrievalMethod elements described in subsequent sections.

    <element name='KeyInfo' type='xenc:KeyInfoType'/>
    <complexType name='KeyInfoType'>
      <complexContent>
        <extension base='ds:KeyInfoType'>
          <sequence>
            <element ref='xenc:KeyRetrievalMethod' minOccurs='0'/>
          </sequence>
        </extension>
      </complexContent>
    </complexType>

This is presently broken as validators will complain of ambigous content models. I'm working on understanding this, and it relates to the question of should create a derived enc:KeyInfoType element based in ds:KeyInfoType, create a enc:KeyInfo based on ds:KeyInfoType, or just use ds:KeyInfo? -- Reagle

3.3.1 The EncryptedKey Element

The EncryptedKey element is used to transport encryption keys from the originator to a known recipient(s). The key value is always encrypted to the recipient(s). It may be used as a standalone XML document, be placed within an application document, or appear inside an EncryptedData element as a child of a KeyInfo element.

  <element name='EncryptedKey' type='xenc:EncryptedKeyType'/>
  <complexType name='EncryptedKeyType'>
    <complexContent>
      <extension base='xenc:EncryptedType'>
        <sequence>
          <element ref='xenc:ReferenceList' minOccurs='0'/>
        </sequence>
        <attribute name='NameKey' type='string' use='optional'/>
      </extension>
    </complexContent>   
  </complexType>

ReferenceList is an optional element containing pointers to data and keys encrypted using this key. The reference list may contain multiple references to EncryptedKey and EncryptedData elements. This is done using KeyReference and DataReference elements repectively. These are defined below.

NameKey is an optional attribute for associating a user readable name with the key value. This may then be used to reference the key using the KeyName element within KeyInfo. The same NameKey label, unlike an id label, may occur multiple times within a single document. The value of the key is to be the same in all EncryptedKey elements identified with the same NameKey label.

Recipient is an optional attribute that contains a hint as to which recipient this encrypted key value is intended for. Its contents are application dependent.

3.3.2 The KeyRetrievalMethod Element

The KeyRetrievalMethod element provides a way to express a link from an EncryptedData element to the EncryptedKey element containing the key used needed to decrypt it. The element may occur multiple times within a KeyInfo element referring to different EncryptedKey objects containing the same key value but encrypted in different ways or for different recipients.

   <element name='KeyRetrievalMethod' type="xenc:KeyRetrievalMethodType"
            substitutionGroup="ds:RetrievalMethod" />
   <complexType name='KeyRetrievalMethodType'>
     <complexContent>
       <restriction base='ds:RetrievalMethodType'>
         <sequence>
           <element name="Transforms" type="ds:TransformsType" minOccurs="0"/> 
         </sequence>  
         <attribute name="URI" type="uriReference"/>
         <attribute name="Type" type="uriReference"
          use="fixed" value="http://www.w3.org/Encryption/2001/03/xmlenc#EncryptedKey"/>
       </restriction>
     </complexContent>
   </complexType>

KeyRetrievalMethod uses similar syntax and dereferencing behavior to the RetrievalMethod element in [XMLDSIG], except the type attribute is absent since an EncryptedKey element is the only legal result of following the reference.

3.5 The ReferenceList Element

ReferenceList is an element that contains pointers from a key to data or keys encrypted by the key.

  <element name='ReferenceList'>
    <complexType>
      <sequence>
        <element name='DataReference' type='xenc:ReferenceType'
                 minOccurs='0' maxOccurs='unbounded'/>
        <element name='KeyReference' type='xenc:ReferenceType'
                 minOccurs='0' maxOccurs='unbounded'/>
      </sequence>
    </complexType>
  </element>
 
  <complexType name="ReferenceType">
    <sequence>
      <any namespace='##other' minOccurs='0' maxOccurs='unbounded'/>
    </sequence>
    <attribute name='URI' type='uriReference' use='optional'/>
  </complexType>

DataReference elements are used to refer to EncryptedData objects that were encrypted using the key defined in the enclosing EncryptedKey element. Multiple DataReference elements can occur if multiple EncryptedData elements exist that are encrypted by the same key.

KeyReference elements are used to refer to EncryptedKey objects thata were encrypted using the key defined in the enclosing EncryptedKey element. Multiple KeyReference elements can occur if multiple EncryptedKey elements exist that are encrypted by the same key.

For both types of references one may optionally specify child elements to aid the recipient in retrieving the EncryptedKey and/or EncryptedData objects. These could include information such as XPath transforms, decompression transforms, or information on how to retrieve the objects from a document storage facility.

4. Processing Rules

This section describes the operations to be performed as part of encryption and decryption processing.

4.1 Encryption

For each data item or key to be encrypted:

  1. 1. Select the algorithm (and parameters) to be used in encrypting this item.
  2. 2. Generate or obtain the encryption key to be used.
  3. 3. Locate the octet sequence to be encrypted.
    1. If the data to be encrypted is an element, the octet sequence is the UTF-8 encoded string representation of the element. This string begins with the left angle bracket of the start tag of the element, and ends with the right angle bracket of the end tag of the element, both inclusive. This string is interpreted as an octet sequence and encrypted by the key obtained in the previous step.
    2. If the data to be encrypted is an element content (i.e., a NodeList), the octet sequence is the UTF-8 encoded string representation of the NodeList. The string starts with the first character following the right angle bracket of the start tag of  the element, and ends with the last character before the left angle bracket of the end tag of the element, both inclusive. The string is interpreted as an octet sequence and encrypted by the key obtained in the previous step.
    3. If the data to be encrypted is an external octet sequence, it is encrypted by the key obtained in the previous step.
  4. 4. Build the XML structure for this encryption step
    1. If the data being encrypted is an element or node list, the unencrypted data is removed and replaced with the new XML structure.
    2. If the data being encrypted is an external octet sequence, replace the value with the encrypted result and create an EncryptedData structure referencing the encrypted data. The EncryptedData structure can be inserted into another XML Document or used as the top-level node in a new XML Document.

4.2 Decryption

For each item to be decrypted:

  1. Parse the XML to determine the algorithm, parameters and key to be used.
  2. Locate the data to be decrypted
  3. If necessary, decrypt the data encryption key. Alternatively, retrieve from some local store using the provided attributes or implicit binding.
  4. Perform the data decryption operation.
  5. If it is an EncryptedData structure and the type is "Element" or "NodeList", then transform the plain text document. This means the decrypted octet sequence should be interpreted as a UTF-8 encoded string representing a serialized XML fragment, which might not be well-formed XML. This XML fragment is converted into the character encoding of the surrounding document and then replaces the data in the document starting with the left angle bracket of the start tag of the EncryptedData element and ending with the right angle bracket of the end tag of the element. If the data type is an external media type, then the data is made available to the using application, but no document transform is done. How the decrypted data is made available is an implementation decision and is beyond the scope of this specification.

6 Security Considertations

6.1 Relationship to XML Digital Signatures

The application of both encryption and digital signatures over portions of an XML document can make subsequent decryption and signature verification difficult. In particular, when verifying a signature one must be know whether the signature was computed over the encrypted or unencrypted representation of elements.

A separate, but important, issue is introducing cryptographic vulnerabilities when combining digital signatures and encryption over a common XML element. Hal Finney has suggested that encrypting digitally signed data, while leaving the digital signature in the clear, may allow plaintext guessing attacks.

In accordance with the requirements document [EncReq] the interaction of encryption and signing is an application issue and out of scope of the specification. However, we make the following recommendations:

  1. When data is encrypted, any signature over that data should be encrypted. This satisfies the first issue in that only those signatures that can be seen can be validated. It also addresses the plaintext guessing vulnerability, though it may not be possible to identify (or even know of) all the signatures over a given piece of data.
  2. Employ the "decrypt-except" signature transform, being developed as a separate specification. It works as follows: during signature transform processing, if you encounter a decrypt transform, decrypt all encrypted content in the document except for those excepted by an enumerated set of references. This specification will also need to address vulnerabilities arising from plaintext guessing attacks in a similar way.

6.2

...

6.3 Multiple Data References

  1. If an encryptor uses the same symmetric key to encrypt multiple data objects to multiple recipients
  2. where each

 

...

7 Schema, DTD, Valid Examples

...

8 Issues

8.1 Recently Closed

  1. The ‘Recipient’ attribute resolves how we’ll handle multiple keys encrypted to different recipients. -- Dillaway
  2. We will not provide a way to provide a key reference that points to multiple EncryptedData or EncryptedKey elements.-- Dillaway
  3. EncryptedKey becomes a child of KeyInfo when used inside an EncryptedData.-- Dillaway
  4. Requirements moved/integrated into requirements document. -- Reagle.
  5. More complete schema definitions. -- Reagle.

8.2 Recently Openned

  1. Undersand processing model, reliance upon DOM, use Information Set Items (and replace usage of "fragment" which is undefined." -- Reagle
  2. Fix KeyInfo usage/derivation from dsig.-- Realge
  3. We need some explicit schema that indicates an EncryptedKey is valid as either a standalone element or a child of a KeyInfo. -- Dillaway
  4. Plug in algorithm section as it matures. -- Reagle.

11.0 References

3DES
ANSI. Triple Data Encryption Algorithm Modes of Operation, ANSI X9.52, 1998.
AES
Joan Daemen and Vincent Rijmen. AES Proposal: Rijndael, 2000.
DOM
Document Object Model (DOM) Level 1 Specification. W3C Recommendation. V. Apparao, S. Byrne, M. Champion, S. Isaacs, I. Jacobs, A. Le Hors, G. Nicol, J. Robie, R. Sutor, C. Wilson, L. Wood. October 1998.
http://www.w3.org/TR/1998/REC-DOM-Level-1-19981001/
EncReq
Joseph Reagle. XML Encryption Requirements.
ESDH
Eric Rescorla. Diffie-Hellman Key Agreement Method, RFC 2631, 1999.
HMAC
RFC 2104. HMAC: Keyed-Hashing for Message Authentication. H. Krawczyk, M. Bellare, R. Canetti. February 1997.
http://www.ietf.org/rfc/rfc2104.txt
HTTP
RFC 2616. Hypertext Transfer Protocol -- HTTP/1.1. J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee. June 1999.
http://www.ietf.org/rfc/rfc2616.txt
InfoSet
XML Information Set, W3C Working Draft. John Cowan.
http://www.w3.org/TR/xml-infoset.
KEYWORDS
RFC 2119 Key words for use in RFCs to Indicate Requirement Levels. S. Bradner. March 1997.
http://www.ietf.org/rfc/rfc2119.txt
MD5
RFC 1321. The MD5 Message-Digest Algorithm. R. Rivest. April 1992.
http://www.ietf.org/rfc/rfc1321.txt
MIME
RFC 2045. Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies. N. Freed & N. Borenstein. November 1996.
http://www.ietf.org/rfc/rfc2045.txt
prop1
XML Encryption strawman proposal. Ed Simon and Brian LaMacchia. Aug 09 2000.
prop2
Another proposal of XML Encryption. Takeshi Imamura. Aug 14 2000.
prop3
XML Encryption Syntax and Processing. Dillaway, Fox, Imamura, LaMacchia, Maruyama, Schaad, Simon. December 2000.
PKCS1
RFC 2437. PKCS #1: RSA Cryptography Specifications Version 2.0. B. Kaliski, J. Staddon. October 1998.
http://www.ietf.org/rfc/rfc2437.txt
UTF-16
RFC 2781. UTF-16, an encoding of ISO 10646. P. Hoffman , F. Yergeau. February 2000.
http://www.ietf.org/rfc/rfc2781.txt
UTF-8
RFC 2279. UTF-8, a transformation format of ISO 10646. F. Yergeau. January 1998.
http://www.ietf.org/rfc/rfc2279.txt
URI
RFC 2396. Uniform Resource Identifiers (URI): Generic Syntax. T. Berners-Lee, R. Fielding, L. Masinter. August 1998.
http://www.ietf.org/rfc/rfc2396.txt
URI-Literal
RFC 2732. Format for Literal IPv6 Addresses in URL's. R. Hinden, B. Carpenter, L. Masinter. December 1999.
http://www.ietf.org/rfc/rfc2732.txt
URL
RFC 1738. Uniform Resource Locators (URL). Berners-Lee, T., Masinter, L., and M. McCahill. December 1994.
http://www.ietf.org/rfc/rfc1738.txt
URN
RFC 2141. URN Syntax. R. Moats. May 1997.
http://www.ietf.org/rfc/rfc2141.txt
RFC 2611. URN Namespace Definition Mechanisms. L. Daigle, D. van Gulik, R. Iannella, P. Falstrom. June 1999.
http://www.ietf.org/rfc/rfc2611.txt
X509v3
ITU-T Recommendation X.509 version 3 (1997). "Information Technology - Open Systems Interconnection - The Directory Authentication Framework"  ISO/IEC 9594-8:1997.
XML
Extensible Markup Language (XML) 1.0. W3C Recommendation. T. Bray, J. Paoli, C. M. Sperberg-McQueen. February 1998.
http://www.w3.org/TR/1998/REC-xml-19980210
XML-C14N (update)
Canonical XML. W3C Proposed Recommendation. J. Boyer. January 2001.
http://www.w3.org/TR/2000/PR-xml-c14n-20010119
http//www.ietf.org/internet-drafts/draft-ietf-xmldsig-canonical-01.txt
XMLDSIG
XML-Signature Syntax and Processing. Working Draft. D. Eastlake, J. Reagle, and D. Solo.
http://www.w3.org/TR/2000/CR-xmldsig-core-20001031/
XML-MT
RFC 2376. XML Media Types. E. Whitehead, M. Murata. July 1998.
http://www.ietf.org/rfc/rfc2376.txt
XML-NS
Namespaces in XML W3C Recommendation. T. Bray, D. Hollander, A. Layman. Janaury 1999.
http://www.w3.org/TR/1999/REC-xml-names-19990114
XML-schema (update)
XML Schema Part 1: Structures W3C Candidate Recommendation. D. Beech, M. Maloney, N. Mendelsohn. October 2000.
http://www.w3.org/TR/2000/CR-xmlschema-1-20001024/
XML Schema Part 2: Datatypes W3C Candidate Recommendation. P. Biron, A. Malhotra. September 2000.
http://www.w3.org/TR/2000/CR-xmlschema-2-20001024/