International Journal on Science and Technology

E-ISSN: 2229-7677     Impact Factor: 9.88

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 16 Issue 2 April-June 2025 Submit your research before last 3 days of June to publish your research paper in the issue of April-June.

XOR CIPHER

Author(s) Sinchana A, Samriddhi V, Sanjana, Shalini C, Suma V Shetty
Country India
Abstract The XOR cipher is a simple symmetric encryption algorithm based on the (XOR) logical operation. It is broadly used in cryptography, data masking, and lightweight encryption applications due to its simplicity and efficiency. The XOR cipher operates by applying the XOR function between the plaintext and a key, ensuring that the encrypted output appears random. The same XOR operation is used for decryption when the ciphertext is XORed with the same key, restoring the original plaintext. Despite its efficiency and ease of implementation, the XOR cipher is vulnerable to attacks if the key is short ,predictable, or reused.However,it forms the foundation for more complex encryption schemes, such as stream ciphers and one- time pad encryption. Due to its lightweight computational requirements ,the XORcipher is often used in embedded systems, secure communication protocols, and hardware security applications. This paper explores the implementation ,advantages, and limitations of the XOR cipher, highlighting its role in modern cryptographic systems. It is the core principle behind the OTP, the only theoretically unbreakable encryption method when used with a truly random key of the message.
Keywords XORCipher, Cryptography, Lightweight Encryption, Bitwise Operation,IOT Security
Published In Volume 16, Issue 1, January-March 2025
Published On 2025-03-27
Cite This XOR CIPHER - Sinchana A, Samriddhi V, Sanjana, Shalini C, Suma V Shetty - IJSAT Volume 16, Issue 1, January-March 2025. DOI 10.71097/IJSAT.v16.i1.2550
DOI https://doi.org/10.71097/IJSAT.v16.i1.2550
Short DOI https://doi.org/g892gv

Share this