SlideShare une entreprise Scribd logo
1  sur  5
1
XOR Cipher:
denotes the Exclusive OR operation,With this logic, a string of text can be
encrypted by applying the bitwise XOR operator to every character using a given key.
To decrypt the output, merely reapplying the XOR function with the key will remove the
cipher.
2
3
4
Binary 128 64 32 16 8 4 2 1
Plain text = Z 0 1 0 1 1 0 1 0
Key = 3 0 0 0 0 0 0 1 1
Cipher text= Y 0 1 0 1 1 0 0 1
5
Example 2:

Contenu connexe

Tendances

Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
Kelly Bresnahan
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
drewz lin
 

Tendances (20)

Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Ch02...1
Ch02...1Ch02...1
Ch02...1
 
Introduction to Homomorphic Encryption
Introduction to Homomorphic EncryptionIntroduction to Homomorphic Encryption
Introduction to Homomorphic Encryption
 
The Factoring Dead: Preparing for the Cryptopocalypse
The Factoring Dead: Preparing for the CryptopocalypseThe Factoring Dead: Preparing for the Cryptopocalypse
The Factoring Dead: Preparing for the Cryptopocalypse
 
Lightweight cryptography
Lightweight cryptographyLightweight cryptography
Lightweight cryptography
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Rsa algorithm
Rsa algorithmRsa algorithm
Rsa algorithm
 
DES Cipher
DES CipherDES Cipher
DES Cipher
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
One Time Pad Encryption Technique
One Time Pad Encryption TechniqueOne Time Pad Encryption Technique
One Time Pad Encryption Technique
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Basic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSSBasic Cryptography unit 4 CSS
Basic Cryptography unit 4 CSS
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Hashing
HashingHashing
Hashing
 

Plus de Garmian

معالجة الصور لتمييز أرقام السيارات.pptx
معالجة الصور لتمييز أرقام السيارات.pptxمعالجة الصور لتمييز أرقام السيارات.pptx
معالجة الصور لتمييز أرقام السيارات.pptx
Garmian
 
Artificial intelligence and environmental development.pptx
Artificial intelligence and environmental development.pptxArtificial intelligence and environmental development.pptx
Artificial intelligence and environmental development.pptx
Garmian
 
INTELLECTUAL PROPERTY AND THE PLAGIARISM.pptx
INTELLECTUAL PROPERTY AND THE PLAGIARISM.pptxINTELLECTUAL PROPERTY AND THE PLAGIARISM.pptx
INTELLECTUAL PROPERTY AND THE PLAGIARISM.pptx
Garmian
 

Plus de Garmian (20)

الواقع المعزز.pptx
الواقع المعزز.pptxالواقع المعزز.pptx
الواقع المعزز.pptx
 
معالجة الصور لتمييز أرقام السيارات.pptx
معالجة الصور لتمييز أرقام السيارات.pptxمعالجة الصور لتمييز أرقام السيارات.pptx
معالجة الصور لتمييز أرقام السيارات.pptx
 
Artificial intelligence and environmental development.pptx
Artificial intelligence and environmental development.pptxArtificial intelligence and environmental development.pptx
Artificial intelligence and environmental development.pptx
 
search-engine1.pptx
search-engine1.pptxsearch-engine1.pptx
search-engine1.pptx
 
data mining.pptx
data mining.pptxdata mining.pptx
data mining.pptx
 
f17dca29bfa11b0a.pdf
f17dca29bfa11b0a.pdff17dca29bfa11b0a.pdf
f17dca29bfa11b0a.pdf
 
Bologna_Process_V13 النهائي.pdf
Bologna_Process_V13 النهائي.pdfBologna_Process_V13 النهائي.pdf
Bologna_Process_V13 النهائي.pdf
 
introduction to java.pptx
introduction to java.pptxintroduction to java.pptx
introduction to java.pptx
 
search-engine.pptx
search-engine.pptxsearch-engine.pptx
search-engine.pptx
 
Artificial intelligence and environmental development.pptx
Artificial intelligence and environmental development.pptxArtificial intelligence and environmental development.pptx
Artificial intelligence and environmental development.pptx
 
INTELLECTUAL PROPERTY AND THE PLAGIARISM.pptx
INTELLECTUAL PROPERTY AND THE PLAGIARISM.pptxINTELLECTUAL PROPERTY AND THE PLAGIARISM.pptx
INTELLECTUAL PROPERTY AND THE PLAGIARISM.pptx
 
data mining.pptx
data mining.pptxdata mining.pptx
data mining.pptx
 
الملكية الفكرية
الملكية الفكريةالملكية الفكرية
الملكية الفكرية
 
How to create limited user accounts in windows 10
How to create limited user accounts in windows 10How to create limited user accounts in windows 10
How to create limited user accounts in windows 10
 
Design interactive whiteboard
Design interactive whiteboard Design interactive whiteboard
Design interactive whiteboard
 
Introduction to windows
Introduction to windowsIntroduction to windows
Introduction to windows
 
Google classroom
Google classroomGoogle classroom
Google classroom
 
Presentation1
Presentation1Presentation1
Presentation1
 
Excel
ExcelExcel
Excel
 
Firewall
FirewallFirewall
Firewall
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

XOR Cipher

  • 1. 1 XOR Cipher: denotes the Exclusive OR operation,With this logic, a string of text can be encrypted by applying the bitwise XOR operator to every character using a given key. To decrypt the output, merely reapplying the XOR function with the key will remove the cipher.
  • 2. 2
  • 3. 3
  • 4. 4 Binary 128 64 32 16 8 4 2 1 Plain text = Z 0 1 0 1 1 0 1 0 Key = 3 0 0 0 0 0 0 1 1 Cipher text= Y 0 1 0 1 1 0 0 1