Unfortunately, this method is impractical for most users, so the modified method is to use a password as a key. The user would keep the encrypted message and the encryption key in different locations, and without both "halves", it is impossible to decrypt the message. The advantage with the XOR function is that using the same encryption key on the cipher text, restores the plain text for example, 65 XOR 42 = 107, then 107 XOR 42 = 65.įor unbreakable encryption, the key is the same length as the plain text message, and the key is made up of random bytes. Each character on a computer is assigned a unique code and the preferred standard is ASCII (American Standard Code for Information Interchange).įor example, uppercase A = 65, asterisk (*) = 42, and lowercase k = 107.Ī modern encryption method is to take a text file, convert the bytes to ASCII, then XOR each byte with a given value, taken from a secret key.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |