User guide

Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP)
15-26
Verifying the SOAP Digital Signature
Digest algorithm
http://www.w3.org/2000/09/xmldsig#sha1
Signature algorithm
http://www.w3.org/2000/09/xmldsig#dsa-sha1
http://www.w3.org/2000/09/xmldsig#rsa-sha1
Canonicalization algorithm
http://www.w3.org/TR/2001/REC-xml-c14n-20010315
http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments
http://www.w3.org/2001/10/xml-exc-c14n#
http://www.w3.org/2001/10/xml-exc-c14n#WithComments
Notes
The XML canonicalization algorithm that does not remove comments is supported. However, since the
format of "#xpointer (xpointer type)" is not supported to specify the signature target, comments cannot
be included in the signature target.
Transformation algorithm
http://www.w3.org/2000/09/xmldsig#base64
http://www.w3.org/TR/1999/REC-xpath-19991116
http://www.w3.org/2000/09/xmldsig#enveloped-signature
http://www.w3.org/2002/06/xmldsig-filter2
Encryption using XML Encryption/ Decryption Using XML Encryption
Symmetric key encryption algorithm
http://www.w3.org/2001/04/xmlenc#tripledes-cbc
Public-key encryption algorithm
http://www.w3.org/2001/04/xmlenc#rsa-1_5
Note
In high-reliability functions, because there is no function for saving a symmetric key, the symmetric key
encryption algorithm and the public-key encryption algorithm should be used together.