Here is a cipher algorithm, based on hexadecimal strings that is implemented by XORing the given plaintext, N number of times where N is its length. But, the catch is that every next XOR operation is done after shifting the consecutive plain text entry to the right. A sample operation is shown below :
Suppose the password is ‘abcd’ then the hexadecimal text is calculated as a1d0a1d by XORing the password with itself N times i.e. 4 times in this case.
Similarly if the password is ‘636f646572’, then
653cae8da8edb426052 is the hexadecimal text.
So, the problem statement is to create a decryption algorithm (in any programming language) and deduce the plain text from the given hexadecimal string.
Input : a1d0a1d Output : abcd abcd once coded will return a1d0a1d Input : 653cae8da8edb426052 Output : 636f646572
Approach : The key ingredient in encrypting and decrypting is in the properties of XOR. XOR is a bitwise operation where the result is 0 if the two possible inputs are same but 1 when the inputs are different. The XOR table is given below for reference :
An important and useful property of XOR that is widely popular in cryptography is that in case of multiple XORing of numbers (say M numbers), if we know only the M – 1 numbers (one is unknown) along with the XOR result then, we can easily calculate the missing number by XORing the known numbers and the XOR result. This property is discussed with the following hexadecimal numbers :
We shall be using the above listed property the most in course of this problem. Now, if we look at the encryption diagram of ‘abcd’ at the base it is just the repeated XORing of the digits. The rightmost digit is d and the rightmost digit of the ‘abcd’ is d as well so the last digit of both plaintext and hexstring is the same. The next digit is 1 which is calculated by XORing the second right digit of abcd and the previous digit i.e. 1 = d ^ c using the property we know the plain text digit can be deduced as d ^ 1 = c. Similarly, the next digit is a which is found by d ^ c ^ b = a. We only need to do this till the half of the hex string as the rest is symmetrical so they are not required.
Below is the implementation of above approach :
Attention geek! Strengthen your foundations with the Python Programming Foundation Course and learn the basics.
To begin with, your interview preparations Enhance your Data Structures concepts with the Python DS Course.
- Image Processing in Python (Scaling, Rotating, Shifting and Edge Detection)
- Rail Fence Cipher - Encryption and Decryption
- Data encryption standard (DES) | Set 1
- Evolution of Malwares from Encryption to Metamorphism
- ElGamal Encryption Algorithm
- Encryption, Its Algorithms And Its Future
- ML | Word Encryption using Keras
- Simplified International Data Encryption Algorithm (IDEA)
- Difference Between Symmetric and Asymmetric Key Encryption
- Strength of Data encryption standard (DES)
- Encryption and Decryption of String according to given technique
- Knapsack Encryption Algorithm in Cryptography
- What is RC4 Encryption?
- Symmetric Encryption Cryptography in Java
- Fernet (symmetric encryption) using Cryptography module in Python
- Asymmetric Encryption Cryptography in Java
- Given a set, find XOR of the XOR's of all subsets.
- Find XOR of two number without using XOR operator
- Choose X such that (A xor X) + (B xor X) is minimized
- XOR Linked List - A Memory Efficient Doubly Linked List | Set 1
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.