Uninformed: Informative Information for the Uninformed

Vol 8» 2007.Sep

XOR Loop

When used as a bit-pad for the XOR operation loop, keyhash is used 8-bits, or 1-byte, at a time. The XOR loop begins with the first byte of the message to be obfuscated and the byte located at index keyhash_offset within keyhash. The two bytes are XORed to produce a result byte. This result byte is placed into the obfuscated message buffer at the same byte index as the original message byte. If the end of the bit-pad is reached, the position of the next byte in the bit-pad returns to the beginning of the bit-pad. When the end of the original message is reached, the obfuscated message buffer should be of equal length to the original message and have one corresponding obfuscated byte for each original byte in the message.

It is important to note that within the scope of steganography terminology, whether or not message data is obfuscated or encrypted is irrelevant. As such, further reference to the obfuscated message will still be referred to as the message, or message data.