Exclusive OR (XOR)
An XOR is binary logic operation: it requires two inputs or operands. The operands are the values of propositions (a statement in which something is confirmed as true or denied as false). An XOR operation between two operands returns a true value if only one of its conditions is true.
An XOR is used as the basis for encryption in Wired Equivalent Privacy (WEP), which is discussed in a bit later in this tutorial.
The following examples show the results of performing an XOR operation on two numbers-1 and 0:
- 1 XOR 1 = 0
- 1 XOR 0 = 1
- 0 XOR 1 = 1
- 0 XOR 0 = 0
Where 0 = False and 1 = True.
In this tutorial:
- Securing Wireless Networks
- Security Background
- Security Services
- Cryptographic Concepts and Terms
- Encryption and Decryption
- Keyspace
- Exclusive OR (XOR)
- Algorithm
- Asymmetric Encryption Algorithms
- Public-Private Key Cryptography
- Cipher
- Concealment Ciphers vs. Running Key Ciphers
- Stream Ciphers vs. Block Ciphers
- Cipher Examples
- Cipher Implementations
- Wi-Fi Protected Access
- TKIP/WPA
- Wi-Fi Protected Access 2 (WPA2)
- CCMP/AES
- Hash Functions
- EAP
- EAP Entities
- EAP Grammar
- EAP Types
- EAP-TTLS
- EAP-PSK
- EAP-SIM
- EAP-AKA
- IEEE 802.11i
- Four-Way Handshake
- IEEE 802.11i Considerations