• 欢迎访问速搜资源吧，如果在网站上找不到你需要的资源，可以在留言板上留言，管理员会尽量满足你！

# 【速搜问答】异或密码是什么

2周前 (04-19) 20次浏览

Chinese-English Translation:

XOR (simple XOR cipher) is a simple encryption algorithm in cryptography, which refers to the XOR operation of information to achieve the purpose of encryption and decryption. According to this logic, each character of the serial text can be encrypted by bitwise XOR operation with the given key.

XOR is a type of logical analysis of two operands. The symbol is XOR or EOR. Different from the general logic or or, when two values are the same, it is no, but when the values are different, it is true. XOR (simple XOR cipher) is a simple encryption algorithm in cryptography, which refers to the XOR operation of information to achieve the purpose of encryption and decryption. According to this logic, each character of the serial text can be encrypted by bitwise XOR operation with the given key. If you want to decrypt, you only need to do the XOR operation between the encrypted result and the key again.

brief introduction

XOR (XOR) is a very important bit operation in computer programming language. It is of great practical value to improve the readability and efficiency of the program. XOR operation has the common properties of exchange law, association law, reflexive law, pairing and so on. It is widely used in parity discrimination, error correction test, network coding, information encryption, image processing and other applications.

XOR cipher is a kind of encryption algorithm through XOR operation, which operates according to the following principles.

This encryption method is similar to symmetric encryption, so the decryption method is as follows:

XOR operators are often used as part of more complex encryption algorithms. For itself, if we use the repeated key, we can use frequency analysis to crack this simple XOR password. If the content of the message is guessed or known, the key will be disclosed. The reason why XOR cipher is worth using is that it is easy to implement and low cost. Simple XOR encryption is sometimes used to hide information without special security.

If the key is random (not duplicate) and the same length as the message, the XOR password is more secure. When the key stream is generated by pseudo-random number generator, the result is stream cipher. If the key is truly random, the result is a one-time password, which is theoretically unbreakable. In any part of these ciphers, key operators are vulnerable to known plaintext attacks, because plaintext is the key

frequency analysis

In mathematics, physics and signal processing, frequency analysis is a method of decomposing function, waveform or frequency composition of signal to obtain spectrum. The distribution of typical letters in English texts. Weaker ciphers show this distribution, which can be deciphered by cryptographers. The distribution of words, the larger the font, the greater the probability of the word. In cryptography, frequency analysis refers to the study of the frequency of letters or letter combinations in text. Frequency analysis can be used to crack classical codes.

Frequency analysis is based on the following principle: in any written language, the frequency of different letters or letter combinations is different. Moreover, any text written in this language has roughly the same distribution of characteristic letters. For example, in English, the letter E appears more frequently than the letter X. Similarly, the frequency of St, ng, th and Qu is very high, while NZ and QJ are rare. The 12 most frequent letters in English can be abbreviated as “etaoin shrdlu”.

[361009623@qq.com]  • 版权声明

本站的文章和资源来自互联网或者站长
的原创，按照 CC BY -NC -SA 3.0 CN
协议发布和共享，转载或引用本站文章
应遵循相同协议。如果有侵犯版权的资
源请尽快联系站长，我们会在24h内删
除有争议的资源。
• 网站驱动

• 友情链接

• 支持主题 