International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJSAT
Upcoming Conference(s) ↓
Conferences Published ↓
ALSDAHW-2025
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 17 Issue 2
April-June 2026
Indexing Partners
XOR CIPHER
| Author(s) | Sinchana A, Samriddhi V, Sanjana, Shalini C, Suma V Shetty |
|---|---|
| Country | India |
| Abstract | The XOR cipher is a simple symmetric encryption algorithm based on the (XOR) logical operation. It is broadly used in cryptography, data masking, and lightweight encryption applications due to its simplicity and efficiency. The XOR cipher operates by applying the XOR function between the plaintext and a key, ensuring that the encrypted output appears random. The same XOR operation is used for decryption when the ciphertext is XORed with the same key, restoring the original plaintext. Despite its efficiency and ease of implementation, the XOR cipher is vulnerable to attacks if the key is short ,predictable, or reused.However,it forms the foundation for more complex encryption schemes, such as stream ciphers and one- time pad encryption. Due to its lightweight computational requirements ,the XORcipher is often used in embedded systems, secure communication protocols, and hardware security applications. This paper explores the implementation ,advantages, and limitations of the XOR cipher, highlighting its role in modern cryptographic systems. It is the core principle behind the OTP, the only theoretically unbreakable encryption method when used with a truly random key of the message. |
| Keywords | XORCipher, Cryptography, Lightweight Encryption, Bitwise Operation,IOT Security |
| Published In | Volume 16, Issue 1, January-March 2025 |
| Published On | 2025-03-27 |
| DOI | https://doi.org/10.71097/IJSAT.v16.i1.2550 |
Share this

CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.