DATA ENCRYPTION USING XOR CIPHER

  • Golovko G
  • Matiashenko A
  • Solopihin N
N/ACitations
Citations of this article
12Readers
Mendeley users who have this article in their library.

Abstract

This article offers an example of using an application whose main task is to encrypt data such as files and private messages. Data encryption is performed using an encryption algorithm - xor. The XOR cipher is a data encryption algorithm using exclusive disjunction. Acquired widespread use in computer networks in the 90's due to the ease of implementation. Used to encrypt Microsoft Word documents in Windows. The XOR encryption algorithm is to "overlay" a sequence of random numbers on the text to be encrypted. A sequence of random numbers is called a gamma sequence, and is used to encrypt and decrypt data. If you use a key with a length at least equal to the length of the message, the XOR cipher becomes much more crypto-resistant than when using a duplicate key. For cryptological protection of information of the travel company Rest & Travel, EDcrypt software has been created, which performs the following functions: account login; inability to use the system without logging in to the account; notification of entering incorrect user data; message encryption; decryption of messages; the ability to select the recipient of the message; encryption of text files; decryption of text files; sending text files to selected recipients; three interface languages: English, Russian, Ukrainian

Cite

CITATION STYLE

APA

Golovko, G., Matiashenko, A., & Solopihin, N. (2021). DATA ENCRYPTION USING XOR CIPHER. Системи Управління, Навігації Та Зв’язку. Збірник Наукових Праць, 1(63), 81–83. https://doi.org/10.26906/sunz.2021.1.081

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free