You are a budding hacker and you somehow have access to a stream of encrypted data. You are given access to the cipher key and told that the stream of encrypted information is encrypted using Repeating Key XOR cipher. The key changes every 24 hours.

Given an encrypted text and also the key used, can you generate the original text back?

Input Format

The first line of input is the cipher key and the second line of input is the cipher text in it's hex format.

Constraints

1 <= len(cipher key) <= 1000
1 <= len(cipher text) <= 1000
All cipher keys are ASCII characters.

Output Format

Print the decoded original text.

Sample Input

hacker
0000000000001a000d00

Sample Output

hackerrank

Explanation

Using the key hacker on the encrypted text 0000000000001a000d00, the decrypted text is hackerrank.

  1. Challenge Walkthrough
    Let's walk through this sample challenge and explore the features of the code editor.1 of 6
  2. Review the problem statement
    Each challenge has a problem statement that includes sample inputs and outputs. Some challenges include additional information to help you out.2 of 6
  3. Choose a language
    Select the language you wish to use to solve this challenge.3 of 6
  4. Enter your code
    Code your solution in our custom editor or code in your own environment and upload your solution as a file.4 of 6
  5. Test your code
    You can compile your code and test it for errors and accuracy before submitting.5 of 6
  6. Submit to see results
    When you're ready, submit your solution! Remember, you can go back and refine your code anytime.6 of 6
  1. Check your score