This is the 4th part in a series and 3rd video on the Youtube.
Commands used in the video:
F3 + F8 Set the XOR ASCII/Hex string to be used as a key to XOR with the file data
F8 Apply 1 step of XOR operation to the data at the current cursor position.
cryptopals.com challenge Challenge used as an example in this video.
See also other posts in the series: Part 1.
Part 2
Part 3
HIEW tutorial hexadecimal editor part 4 encrypting decrypting with XOR
keywords: languages, programming, assembly-language, reversing, software-protection