XOR
function function bitwise between the
strings, giving the ciphertext. The recipient can then apply the
same key to the ciphertext using XOR
function
and thus recover the original plaintext.s/key
for a practical, working example of a
one-time pad system. Lecture 17: Introduction to Encryption | Copyright © 2005 P.Scott, La Trobe University Bendigo. |