@techreport{enhanced-xml-digital-signature-algorithm-01, number = {draft-enhanced-xml-digital-signature-algorithm-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-enhanced-xml-digital-signature-algorithm/01/}, author = {jitendra Kumar and Balaji Rajendran and BS. Bindhumadhava}, title = {{Enhanced XML Digital Signature Algorithm to Mitigate Wrapping Attacks}}, pagetotal = 11, year = 2019, month = feb, day = 4, abstract = {XML signature standard {[}RFC3275{]}identifies signed elements by their unique identities in the XML document. However this allows shifting of XML elements from one location to another within the same XML document, without affecting the ability to verify the signature. This flexibility paves the way for an attacker to tweak the original XML message without getting noticed by the receiver, leading to XML Signature wrapping or rewriting attacks. This document proposes to use absolute XPath as a "Positional Token" and modifies the existing XML Digital Signature algorithm to overcome this attack.}, }