![]() ![]() The advantage of using the XOR operation for this, is that it can be reverted, simply by carrying out the same operation again. The ciphertext is generated by applying the logical XOR operation (exclusive-or) to the individual bits of plaintext and the key stream. The Vernam Cipher is based on the principle that each plaintext character from a message is 'mixed' with one character from a key stream. The message to be encrypted is split into units like words, or pair of words or even letters, the receiver then performs inverse substitution to get back those units in order, when placed together form the original plain text. Substitution Ciphers is a very simple and primitive method for data encryption, where the plaintext is replaces with the ciphered text and can be decrypted by a specific decryption algorithm or a key, which only the receiver must know. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |