You get a bonus - 1 coin for daily activity. Now you have 1 coin

XOR encryption example

Lecture



Strangely enough, but the simplest and one of the most effective (if used correctly) encryption algorithms is the so-called XOR encryption. Let's try to consider the idea of ​​this simplest method.
As is known from Boolean algebra, the logical addition operation “?” Modulo 2 (or logical exclusive OR - XOR, eXclusive OR) has the following semantics:

  XOR encryption example

That is, the operation z = x? y is essentially bitwise (bitwise - the result does not depend on adjacent bits). If only one of the corresponding bits is 1, then the result is 1. And if both are 0 or both are 1, then the result is 0. If you look closely at the result of applying XOR to two binary numbers, you can see that we can reconstruct one of the terms with second: x = z? y or y = z? x.

From this we can draw the following conclusions: knowing the number y and applying XOR to x, we get z. Then, again, using y, we get the number x back from z. Thus, we can convert a sequence of numbers (x) i into a sequence (z) i. Now we can call the number y the encoding (or encrypting) key. If a person does not know the key, then he will not be able to restore the original sequence of numbers (x) i. But if (x) i is a byte representation of the letters of the text, then an experienced user will be able to open the encrypted text. Since each letter will be represented in the ciphertext with the same z code, using the frequency dictionary, the hacker will be able to calculate the encryption key y if he has a sufficiently long ciphertext in the array.

created: 2016-09-19
updated: 2021-03-13
184



Rating 9 of 10. count vote: 2
Are you satisfied?:



Comments


To leave a comment
If you have any suggestion, idea, thanks or comment, feel free to write. We really value feedback and are glad to hear your opinion.
To reply

Information security, Cryptographic ciphers

Terms: Information security, Cryptographic ciphers