• Simple XOR Encryption/Decryption in C++ (And Several Other Languages)


    For details on how to implement XOR encryption using Go, see this post.

    If you are looking for XOR encryption for other languages, including C, C#, Dart, Go, Groovy, Java (Android Compatible), JavaScript, Objective-C, and Python, I have made them available at this GitHub repo.

    XOR encryption (or Exclusive-OR encryption) is a common method of encrypting text into a format that cannot be trivially cracked by the average person. XOR encryption is great for storing things like game save data, and other data types that are stored locally on a users computer, that while not a big deal if they are tampered with, you would like to deter people from doing so. XOR encryption is also used often as a part of more complex encryption algorithms.

    The idea behind it is that if you don't know the original character or the XOR encryption key, it is impossible to determine what either one is. However, the reason that it is not entirely secure is that data almost always contains patterns (JSON uses '{' and '}' characters, XML contains plenty of '<' and '>' characters, etc.) so if someone is able to determine the pattern and unlock even one character, they will have the key to unlocking everything else.

    However secure or insecure XOR encryption really is, it has plenty of valid use cases. Any kind of deterrent added to data that you don't want users to tamper with but that they will have easy access to is a prime candidate, so long as security isn't paramount.

    The concept is simple, you define a key character, and for every character in the string you want to encrypt, you apply the key. Once you want to unencrypt the encrypted data, you simply go through the string and apply the key again.

    Here's a very simple implementation in C++, which uses the ^ character for XOR:

    #include<iostream>

    usingnamespace std;

    string encryptDecrypt(stringtoEncrypt) {

        char key = 'K'; //Any char will work

        string output = toEncrypt;

        for (int i = 0; i < toEncrypt.size(); i++)

            output[i] = toEncrypt[i] ^ key;

        return output;

    }

    int main(intargc, constchar * argv[])

    {

        string encrypted = encryptDecrypt("kylewbanks.com");

        cout << "Encrypted:" << encrypted << " ";

        string decrypted = encryptDecrypt(encrypted);

        cout << "Decrypted:" << decrypted << " ";

        return 0;

    }

     

    And here's the output:

    Encrypted: 2'.<)*% 8e($&

    Decrypted:kylewbanks.com

     

    As you can see, the encrypted string looks like gibberish, and would deter non-technical people from bothering to tamper with the file. However, if you run something through that algorithm with repetitive characters (JSON, XML, etc.), more tech-savvy individuals may be able to pick up on what you are doing. While you can't quite make it unbreakable, you can make it ridiculously hard to brute-force by using multiple keys in a pattern like so:

    string encryptDecrypt(string toEncrypt) {

        char key[3] = { 'K', 'C', 'Q' }; //Any chars will work

        string output = toEncrypt;

        for (int i = 0; i < toEncrypt.size(); i++)

            output[i] = toEncrypt[i] ^ key[i % (sizeof(key) / sizeof(char))];

        return output;

    }

     

    There are two differences here:

    1. key is now defined as a char array.
    2. We now use the char at index modulos the size of the key array to XOR, rather than the same key for each character to encrypt.

    Now running the same string through there, we get the following output:

    Encrypted: :=.43*-:8m2$.

    Decrypted:kylewbanks.com

     

    It doesn't look that much more secure, but the reason for using multiple keys rather than just one, is that for each additional key you use, you effectively double the amount of time it takes to brute force the encrypted string.

    Full source in a variety of languages available on GitHub.

    来自:https://kylewbanks.com/blog/Simple-XOR-Encryption-Decryption-in-Cpp

  • 相关阅读:
    memcache清理缓存
    JqGrid常见使用方法
    SQLyog 最新版本12.5-64bit 完美破解,亲测可用!
    Navicat Premium 最新版本12.1.16-64bit 完美破解,亲测可用!
    【JAVA基础】一:聊聊笔试常见到的 “==、equal” 比较是否相等的内在差别
    scrapy 爬虫返回json格式内容unicode编码转换为中文的问题解决
    Python3的桌面程序开发利器:Eric6的环境搭建、使用
    通过Redis、Memcache的 incr 原子操作防刷机制的使用差别
    从零开始搭建一个从Win7环境备份至CentOS7的SVN双机备份环境
    通过Quartz 配置定时调度任务:使用cron表达式配置时间点
  • 原文地址:https://www.cnblogs.com/time-is-life/p/8728792.html
Copyright © 2020-2023  润新知