Encryption: The password is XOR'd with a key, and each character of the input is transformed. Decryption: Since XOR is a reversible operation, the same key is used to decrypt the password, returning ...
XOR Properties: (Source: http://en.wikipedia.org/wiki/Exclusive_or) I. Commutative: YES (i.e. a XOR b XOR c = b XOR a XOR c = c XOR a XOR b and all possible ...