Redundancy in XOR encryption