Thanks for the review.STARGÅTE wrote: Fri Jan 24, 2025 9:32 am It's a pleasure, indeed. Your new code has now other bugs:
- On line 15, "b -1", you decrease the loop limit each round by one byte. So the latter bytes are encrypted just one or two rounds, not three.
- The "key" structure is now a byte array and as your round-loop has only three rounds (plus an extra byte) you use only 4 bytes of your 12 bytes key!
- What is the sense of line 18-20, where you change the key itself, when the byte position is odd?
My aim to design a NOT Common XOR that can transform easily and also increase security compare to ordinary XOR,
1. Every byte of msg was adapt to XOR with different key , different from the key input by user
2. Even if people get encrypted msg and key , he couldn't simply XOR to see the original text
How to do , with the same procedure , by changing to the outer loop number i , and b parameter , so you have custom XOR that i can't decrypt (not easily at least

it is not consistent XOR , so the last few byte is to confuse others that it is "ordinary XOR" , but it is NOT .
The line 18-20 is to achieve that , even you know the key , but it is not "ordinary XOR" , so it wouldn't work by simply XOR , the key is changing it self
This is just junior approach to design a "Self Adapt Key Transforming XOR" algorithm.