- From: Takahiro SUGIYAMA <t-sugiyama@da.jp.nec.com>
- Date: Wed, 01 Oct 2003 19:26:23 +0900
- To: xml-encryption@w3.org
Hi All,
The following URL is a download page of NEC's reference toolkit for the
XML Encryption.
http://www.sw.nec.co.jp/soft/xml_e/main_e.html
Thanks,
Takahiro SUGIYAMA
>
> Hi Joseph,
>
> The following is NEC's interop result for the XML Encryption.
> Could you add our record to the matrix?
>
> Thanks in advance,
> Takuya Mori
>
> ----
> Takuya Mori
> moritaku@bx.jp.nec.com / tk-mori@isd.nec.co.jp
> Internet Solution Platform Development Div.,
> NEC Solutions, Tokyo Japan
>
>
> [Application Features] NEC
> Laxly valid schema generation of EncryptedData/EncryptedKey: Y
> * Normalized Form C generations.: N (*1)
> Type, MimeType, and Encoding: Y
> CipherReference URI derefencing: Y
> * Transforms: Y
> ds:KeyInfo: Y
> * enc:DHKeyValue: Y
> * ds:KeyName: Y
> * ds:RetrievalMethod: Y
> ReferenceList: Y
> EncryptionProperties: Y
> Satisfactory Performance: Y
> [Processing Features]
> Required Type support Element and Content.: Y
> Encryption: Y
> * Serialization of XML Element and Content.: Y
> 1.NFC conversion from non-Unicode encodings(dchanged
> such that the application MUST provide data in NFC form) N (*1)
> * Encryptor returns EncryptedData structure.: Y
> * Encryptor replaces EncryptedData source document(when Type
> is Element or Content).: Y
> Decryption: Y
> * The decryptor returns the data and its Type to
> the application(be it an octet sequence or key value).: Y
> * If data is Element or Content the decryptor return
> the UTF-8 encoding XML character data.: Y
> * If data is Element or Content the decryptor replaces
> the EncryptedData in the source document with the decrypted
> data.: Y
> [Algorithm]
> TRIPLEDES: Y1 Y2
> AES-128: Y1 Y2
> AES-256: Y1 Y2
> AES-192: Y1 Y2
> RSA-v1.5(192 bit keys for AES or DES): Y1 Y2
> RSA-OAEP(128 and 256 bit keys for AES): Y1 Y2
> Diffie-Helman Key Agreement: Y1 Y2
> TRIPLEDES Key Wrap: Y1 Y2
> AES-128 Key Wrap (128 bit keys): Y1 Y2
> AES-256 Key Wrap (256 bit keys): Y1 Y2
> AES-192 KeyWrap: Y1 Y2
> SHA1: Y1 Y2
> SHA256: Y1 Y2
> SHA512: Y1 Y2
> RIPEMD-160: Y1
> XML Digital Signature: Y
> Decryption Transform for XML Signature: Y3
> * XML Mode: Y3
> * Binary Mode: Y3
> * Profiled X Pointer support in Except URI: Y3
> * Profiled X Pointer support in Except URI into replacement
> node-sets(I.e. super-decryption).: Y3 (*2)
> * Full X Pointer support in Except URIs.: N
> Canonical XML (with and without coments): Y
> Exclusive Canonicalization (with and without comments): Y
> base64 Encoding: Y1 Y2
>
> Some Comments:
> *1: Our not supporing these features is intentional.
> *2: If the meaning of "Profiled X Pointer support" is "support
> for the same-document XPointers '#xpointer(/),
> #xpointer(id('ID'))' as described in 4.3.3.2 The Reference
> Processing Model", we think we support the feature.
>
>
> ==== End of our interop report ====
>
Takahiro SUGIYAMA
NEC Corporation
Internet Sokution Platform Deveopment Division
Received on Wednesday, 1 October 2003 06:34:04 UTC