Sorry for the barge and answer late ....
E (key1, E (key2, message)) = E (key2, E (key1, message))
... that is, (key1 XOR message) XOR key2 == (key2 XOR message) XOR key1, so the keys can be used in any order for encryption or decryption, but both keys are needed to decrypt the message, which is thus encrypted.
They are not equivalent. Within the XOR clause, you can find a third key, key3, such that (key3 XOR message) == ((key1 XOR message) XOR key2). key3 will be (key1 XOR key2). I believe the property does not meet the OP requirements.
Returning to my cryptography class (and IIRC), it took some mathematicians some time to prove that DES was not closed under his operation, so there was no short break in restoring plain text using 2-key triple des and 3-key triple des. That is, E (key1, E (key2, Message))! = E (key3, message).
Jeff
source share