Crypto Techniques

Hashes

Length Evaluation

XOR Two Files

XOR Two Strings