![]() | 6.3 ECES ~ The Exclusive-OR Function
(continued)
The message can be finally encrypted by combining the message bit-string M with the mask bit-string Y though an "exclusive-or" function. An exclusive-or function (often denoted by XOR or
![]()
For example: if the message M = 00110101 and the mask Y = 10010001,
![]()
Then the cyphertext C is C = Y
It is this cyphertext bit-string C that is transmitted to Alice.
A remarkable characteristic of the XOR function is that when it is re-applied to the output, the original bit-string is obtained. Here: M = C |
![]() Since Alice also knows that secret value z, she can apply it to the same masking function that Bob used to create the mask Y. By applying the XOR function to the mask and cyphertext bit-strings, Alice decrypts the cyphertext back into the original message, M. | |
![]()
![]() ![]() ![]() |
|