Зміст курсу
Cyber Security Fundamentals
1. Introduction to Cyber Security
Cyber Security Fundamentals
XOR decryption
We have already considered how to provide XOR encryption in the previous chapter. But what about decryption?
Let's look at the following code:
The decoding function is almost the same as encoding; the only difference is the existence of the additional line that decodes binary representation into the text format (line 28
).
Все було зрозуміло?
Зміст курсу
Cyber Security Fundamentals
1. Introduction to Cyber Security
Cyber Security Fundamentals
XOR decryption
We have already considered how to provide XOR encryption in the previous chapter. But what about decryption?
Let's look at the following code:
The decoding function is almost the same as encoding; the only difference is the existence of the additional line that decodes binary representation into the text format (line 28
).
Все було зрозуміло?