Crypto Techniques
Hashes
Length Evaluation
XOR Two Files
XOR Two Strings