XOR
function function bitwise between the
strings, giving the ciphertext. The recipient can then apply the
same key to the ciphertext using XOR
function
and thus recover the original plaintext.s/key
for a practical, working example of a
one-time pad system. Lecture 16: Introduction to Encryption | Copyright © 2004 P.Scott, La Trobe University Bendigo. |