User guide
Chapter 15: User Authentication, SOAP Digital Signature and XML Encryption for Web Services (SOAP)
15-26
Verifying the SOAP Digital Signature
• Digest algorithm
− http://www.w3.org/2000/09/xmldsig#sha1
• Signature algorithm
− http://www.w3.org/2000/09/xmldsig#dsa-sha1
− http://www.w3.org/2000/09/xmldsig#rsa-sha1
• Canonicalization algorithm
− http://www.w3.org/TR/2001/REC-xml-c14n-20010315
− http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments
− http://www.w3.org/2001/10/xml-exc-c14n#
− http://www.w3.org/2001/10/xml-exc-c14n#WithComments
Notes
The XML canonicalization algorithm that does not remove comments is supported. However, since the
format of "#xpointer (xpointer type)" is not supported to specify the signature target, comments cannot
be included in the signature target.
• Transformation algorithm
− http://www.w3.org/2000/09/xmldsig#base64
− http://www.w3.org/TR/1999/REC-xpath-19991116
− http://www.w3.org/2000/09/xmldsig#enveloped-signature
− http://www.w3.org/2002/06/xmldsig-filter2
Encryption using XML Encryption/ Decryption Using XML Encryption
• Symmetric key encryption algorithm
− http://www.w3.org/2001/04/xmlenc#tripledes-cbc
• Public-key encryption algorithm
− http://www.w3.org/2001/04/xmlenc#rsa-1_5
Note
In high-reliability functions, because there is no function for saving a symmetric key, the symmetric key
encryption algorithm and the public-key encryption algorithm should be used together.