ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

XOR Encryption/Decryption Algorithm

Journal: INTERNATIONAL JOURNAL OF TECHNOLOGY MANAGEMENT & HUMANITIES (Vol.1, No. 2)

Publication Date:

Authors : ; ;

Page : 1-7

Keywords : Encrypting; Decryption; Exclusive-OR (XOR); Gray scale image; Cipher image; Scrambled bit plane;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Encryption is the most effective way to achieve data security. The process of Encryption hides the contents of a message in a way that the original information is recovered only through a decryption process. The purpose of Encryption is to prevent unauthorized parties from viewing or modifying the data. Encryption occurs when the data is passed through some substitute technique, shifting technique, table references or mathematical operations. All those processes generate a different form of that data. The unencrypted data is referred to as the plaintext and the encrypted data as the cipher text, which is representation of the original data in a difference form. Key-based algorithms use an Encryption key to encrypt the message. One simple and good way to encrypt data is through rotation of bits or sometimes called bit shifting. But, rotation of bits is more advanced than simple bit shifting. In rotation of bits operation, the bits are moved, or shifted, to the left or to the right. The different kinds of shifts typically differ in what they do with the bits. Keyword: Encrypting, Decryption, Exclusive-OR (XOR), Gray scale image, Cipher image, Scrambled bit plane

Last modified: 2016-05-12 19:49:57