XOR function function bitwise between the
strings, giving the ciphertext. The recipient can then apply the
same key to the ciphertext using XOR function
and thus recover the original plaintext.s/key for a practical, working example of a
one-time pad system. | Lecture 17: Introduction to Encryption | Copyright © 2005 P.Scott, La Trobe University Bendigo. |