What is Ciphertext?
Answers were Sorted based on User's Feedback
Answer / pugal
The original message is called a plaintext. The disguised
message is called a ciphertext. Encryption means any
procedure to convert plaintext into ciphertext. Decryption
means any procedure to convert ciphertext into plaintext.
Is This Answer Correct ? | 30 Yes | 5 No |
Answer / prince
ciphertext (or cyphertext) is the result of encryption
performed on plaintext using an algorithm, called a cipher.
[1] Ciphertext is also known as encrypted or encoded
information because it contains a form of the original
plaintext that is unreadable by a human or computer without
the proper cipher to decrypt it. Decryption, the inverse of
encryption, is the process of turning ciphertext into
readable plaintext. Ciphertext is not to be confused with
codetext because the latter is a result of a Code, not a
cipher.
Is This Answer Correct ? | 10 Yes | 1 No |
Answer / suman
origal mesage is know as plain text when we send this
message after coverting into codes which is known as cypher
text.
cypher text is used for security. when cypher text is
reached to the sender then we convert that cypher text into
the plain text.
Is This Answer Correct ? | 12 Yes | 9 No |
Answer / krishna kumar vs
Cipher text is an ecrypted text form. This is created or
generated by modifying the plain/unencrypted text according
to a particular algorithm. This stratergy uses a variety of
data structures like recurrence matrix, quadruple vector etc...
Is This Answer Correct ? | 1 Yes | 1 No |
whats cryptanalysis?
What is the elgamal cryptosystem?
What are the cfb and ofb modes?
What Is Encryption?
Hello. In Snort, how a digital signature is actually created for the authentication purpose and thereby provides intrusion detection as well as prevention. How the software for IDS/IPS comes to know regarding the threat/vulnerability using digital signature ? Whether any specific language or programming is used or not.
What is an encryption "key" and what is the importance of key length?
Does encryption of connection strings in web.config file possible? How?
WHAT IS A SAMPLE USER INTERFACE OF DES ENCRYPTION/DECRYPTION PROJECT?
What happens if a private key is compromised ?
What is luc?
what is trapdoor and how does it works?
What are the ecb and cbc modes?