Anda di halaman 1dari 6

netwinz

netwinz

Guide

XOR CIPHER

Introduction:
Each character of the data is Exclusive ORed with the Key
Character to get the encrypted data. Encrypted data is again
Exclusive ORed with the same Key character to get back the
original data.

The XOR operator is extremely common as a component in more


complex ciphers. By itself, using a constant repeating key, a
simple XOR cipher can trivially be broken using frequency
analysis. If the content of any message can be guessed or
otherwise known then the key can be revealed. Its primary merit
is that it is simple to implement, and that the XOR operation is
computationally inexpensive. A simple repeating XOR cipher is
therefore sometimes used for hiding information in cases where
no particular security is required.

If the key is random and is as long as the message (so it never


repeats), the XOR cipher is more secure. When the keystream is
generated by a pseudo-random number generator, the result is a
stream cipher. With a key that is truly random, the result is a one-
time pad, which is unbreakable even in theory.
HOW TO CONDUCT THE EXPERIMENT:
Click on Presentation Layer on the Main Window and Then Select
“XOR CIPHER” Module from the Modules displayed in the centre
of the window.

XOR CIPHER Window will open up as shown in SNAPSHOT-1.

SNAPSHOT-1

TRANSMITTER:

1. Enter the “IP Address” of the computer to which you intend


to send data.
2. Enter the Key for Encryption. The key length is single
character.

3. Enter the Data that needs to be encrypted in the “TEXT”


textbox.

4. Click on “ENCRYPT” button to encrypt the data and display


the encrypted data in the table.

The table displays Original Character and the encrypted


code as shown in SNAPSHOT-2.

5. Click on the “SEND” button to send the encrypted Data to


the destination IP.

SNAPSHOT-2
Use Loop back Address “127.0.0.1” to send the Data to the same
computer.

RECEIVER:

In the Receiver Window, the Data is displayed in the table as soon


as the frame is received. The Code as well as Ascii representation
of the code if possible is displayed in the table as shown in
SNAPSHOT-3
SNAPSHOT-3

1. Enter the Key value same as entered on the server in the


“KEY” textbox.

2. Click on “DECRYPT” button to decrypt the data. The


Decrypted data is shown in the “TEXT” textbox on the
receiver as shown in SNAPSHOT-4

SNAPSHOT-4

Transmitter and Receiver Messages are Displayed in the


“Message Window” on the extreme right.

Reset Button:
Click On “RESET BUTTON” to reset all the controls to initial values.

Click on “HELP BUTTON” to Open XOR CIPHER Manual.

Click on “EXIT BUTTON” To Close XOR CIPHER Window.


Copyright © 2011 Emblitz Technologies Pvt Ltd. All rights reserved. www.netwinz.com

Anda mungkin juga menyukai