

Bitcoinist, libertarian, atheist, cryptography fan, and founder of http://qvault.io
If you are getting into cryptography, or just trying to understand the fundamentals, you may have noticed that the exclusive-or operation is used quite often, especially in ciphers.
XOR, or “exclusive or” operates on binary data. It returns true if both of its inputs are opposites (one false and one true), otherwise, it returns false.
An example in go code would be something like:
func exclusiveOr(a bool, b bool) bool {
return a != b
}
The XOR operation can be used as a simple cipher for encrypting and decrypting messages with a single key. This is known as symmetric encryption.
It is interesting to note that if:
Then the cipher is impossible to crack. This is known as a one time pad. However, a simple XOR shouldn’t be used in production due to the key length needing to be too long to be practical.
As a simple example, let’s encrypt the word “hi”
1. Convert “hi” to binary, here is a free tool: https://www.rapidtables.com/convert/number/ascii-to-binary.html)
01101000 01101001
2. Create a random secret key that has the same length:
01010010 01000101
3. Create an encrypted message by XOR’ing the message and the key:
01101000 01101001 ("hi")
XOR
01010010 01000101 (secret key)
=
00111010 00101100 (encrypted message)
4. Decrypt the message by XOR’ing the key with the encrypted message again:
00111010 00101100 (encrypted message)
XOR
01010010 01000101 (secret key)
=
01101000 01101001 ("hi")
XOR works as a cipher because it is its own inverse.
𝑎 = (𝑎 ⊕ 𝑏) ⊕ 𝑏
And, as we demonstrated in our example:
encrypted = message ⊕ key
and
message = encrypted ⊕ key
The simple XOR cipher isn’t used in production because it is impractical to use keys that are the same length as the message body. However, the XOR is still extremely useful. In fact, it is used in almost all symmetric encryption algorithms. XOR is the primary operation in the “add round key” step of AES-256. It is also used in the DES cipher.
Previously published at https://qvault.io/2020/01/18/why-is-exclusive-or-xor-important-in-cryptography/
Create your free account to unlock your custom reading experience.