One of the most common bases for encryption.

The Process

These types of encryptions require only:

  • a key
  • original data They will be XOR’d together, making an encrypted data If you want it back, then just XOR with the same key again