- From: Joseph M. Reagle Jr. <reagle@w3.org>
- Date: Mon, 30 Oct 2000 17:46:04 -0500
- To: Steve Wiley <steve@myProof.com>
- Cc: xml-encryption@w3.org
At 10:51 10/28/2000 -0700, Steve Wiley wrote:
>Yes, it would be in opposition if it was the same implementation. The
>requirement is as you surmised. "one should have the option not to change
>the original tag structure". I did not intendthis to be a requirement of
>XML Encryption. The requirement is that an implementation should be able
>to have a requirement and have the ability to implement the requirement
>"the original document structure not be changed".
Ok, I reflect this in the beta requirements document as:
C XML Encryption applications must not violate the DTD/schema valid of the
target instance. "We have encountered several applications where the
customer wishes to encrypt attribute or element CDATA without changing,
adding, or deleting any XML tags." {MyProof}
1. To satisfy this requirement the document to be encrypted SHOULD be
referenceable from an external document via XPath. {MyProof}
2. Any "[XPath] feature causes serious performance problems because the
document must be fully buffered in order to apply the XPath expression."
{Andy Clark}
>>What exactly do you mean by an encryption/decryption protocol [1]?
>
>A set of rules for encryption and decryption that guarantee the integrity
>of the document.
>a. The document can be restored to its original pre-encryption form.
>b. That all the information originally encrypted by a single key can be
>retrieved. (But not necessarily with that key alone.)
My own understanding of a formal definition of a protocol in this context
could certainly be improvemed, but in xmldsig parlance (where my mind's been
most recently engaged) we called that the processing rules.
>The example below shows how information may be hidden by later
>encryptions. I believe that the integrity of a document that allows
>multiple encryptions and multiple encryption keys requires that a precise
>set of rules and procedures be followed by the entities that are performing
>encryption or decryption. I think that this fits the definition of a
>protocol. Let me know if you differ.
Your application description and scenarios sounds like something XML
Encryption should be able to support and while I can't argue that doesn't
involve a protocol, I suspect we'll end up using the word "protocol" for
something else that might be out of scope (presumptions about state in
communication, request/respond, etc.)
__
Joseph Reagle Jr.
W3C Policy Analyst mailto:reagle@w3.org
IETF/W3C XML-Signature Co-Chair http://www.w3.org/People/Reagle/
Received on Monday, 30 October 2000 17:46:34 UTC