Home On the insecurity of XML Security
Article
Licensed
Unlicensed Requires Authentication

On the insecurity of XML Security

  • Juraj Somorovsky

    Juraj Somorovsky is a postdoctoral researcher at the Ruhr University Bochum, where he continues his research on security and cryptographic protocols. In addition, he is a co-founder of 3curity GmbH, a penetration testing company for Web, Web Services, and Single Sign-On. Before starting his PhD studies, Juraj studied Informatics at the Slovak University of Technology (2003–2006), and IT-Security at the Ruhr University Bochum (2006–2009). In parallel, he worked for Nokia (2007–2008) and Anasoft Technology (2008–2010).

    Horst-Görtz Institute for IT-Security, Ruhr University Bochum, D-44801 Bochum

    EMAIL logo
Published/Copyright: November 30, 2014

Abstract

XML Encryption and XML Signature describe how to apply encryption and signing algorithms to XML documents. These specifications are implemented in a wide range of systems and frameworks processing sensitive data, including banking, eGovernment, eCommerce, military, and eHealth infrastructures. The article presents practical and highly critical attacks which allow to forge signed XML documents or reveal contents of encrypted XML data.

About the author

Juraj Somorovsky

Juraj Somorovsky is a postdoctoral researcher at the Ruhr University Bochum, where he continues his research on security and cryptographic protocols. In addition, he is a co-founder of 3curity GmbH, a penetration testing company for Web, Web Services, and Single Sign-On. Before starting his PhD studies, Juraj studied Informatics at the Slovak University of Technology (2003–2006), and IT-Security at the Ruhr University Bochum (2006–2009). In parallel, he worked for Nokia (2007–2008) and Anasoft Technology (2008–2010).

Horst-Görtz Institute for IT-Security, Ruhr University Bochum, D-44801 Bochum

Received: 2014-3-19
Accepted: 2014-3-21
Published Online: 2014-11-30
Published in Print: 2014-12-28

©2014 Walter de Gruyter Berlin/Boston

Downloaded on 16.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/itit-2014-1045/html?lang=en
Scroll to top button