From Wikipedia, the free encyclopedia
Computing desk
< January 28 << Dec | January | Feb >> Current desk >
Welcome to the Wikipedia Computing Reference Desk Archives
The page you are currently viewing is a transcluded archive page. While you can leave answers for any questions shown below, please ask new questions on one of the current reference desk pages.


January 29 Information

XOR-OTP-Programm?

Is there a simple computer program that just takes a file of random data and XORs its binary format with an input?
Kind of like a one time pad with random data on one side and encryption on the other? — Preceding unsigned comment added by 2A02:908:426:D280:7100:3AFC:91AC:329B ( talk) 17:24, 29 January 2022 (UTC) reply

Here is a simple Python script that does that. CodeTalker ( talk) 18:29, 29 January 2022 (UTC) reply
Be aware that unless your key is at least as long as the plain text, then simple XOR encryption is vulnerable to cracking. Even if your key is long enough, if it contains detectable patterns (such as some poetry) it may still be crackable. Martin of Sheffield ( talk) 19:40, 29 January 2022 (UTC) reply
From Wikipedia, the free encyclopedia
Computing desk
< January 28 << Dec | January | Feb >> Current desk >
Welcome to the Wikipedia Computing Reference Desk Archives
The page you are currently viewing is a transcluded archive page. While you can leave answers for any questions shown below, please ask new questions on one of the current reference desk pages.


January 29 Information

XOR-OTP-Programm?

Is there a simple computer program that just takes a file of random data and XORs its binary format with an input?
Kind of like a one time pad with random data on one side and encryption on the other? — Preceding unsigned comment added by 2A02:908:426:D280:7100:3AFC:91AC:329B ( talk) 17:24, 29 January 2022 (UTC) reply

Here is a simple Python script that does that. CodeTalker ( talk) 18:29, 29 January 2022 (UTC) reply
Be aware that unless your key is at least as long as the plain text, then simple XOR encryption is vulnerable to cracking. Even if your key is long enough, if it contains detectable patterns (such as some poetry) it may still be crackable. Martin of Sheffield ( talk) 19:40, 29 January 2022 (UTC) reply

Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook