Close Menu
Crypto Chain Post
    Trending

    Spot Ether ETFs ongoing inflow streak has hit $812.2M inflows

    June 7, 2025

    Brazil Defies Trump Tariff Threats, Backs Dollar-Free BRICS Trade

    June 7, 2025

    Michael Saylor’s Strategy Announces $979,700,000 Stock Offering in a Bid to Acquire More Bitcoin (BTC)

    June 7, 2025

    Bitcoin Layer 2: Ark

    June 7, 2025

    Self Chain Partners with Crust Network to Redefine Decentralized Storage

    June 7, 2025
    Facebook X (Twitter) Instagram TikTok Telegram
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    Saturday, June 7
    Crypto Chain Post
    Price Index Newsletter
    • Home
    • News
      • Bitcoin
      • Ethereum
      • Altcoin
    • Blockchain
    • Markets
    • NFTs
    • DeFi
    • Web3
    • Analysis
    • Metaverse
    • Resources
      • Price Index
      • Crypto Heatmap
      • Glossary
      • Exchange
      • Economic Calendar
    • More
      • GameFi
      • ICO
      • Legal
      • Security
    Crypto Chain Post
    Home » Ciphertext

    Ciphertext

    News RoomBy News RoomDecember 30, 2022No Comments2 Mins Read

    Ciphertext is a result of encryption that has been performed on plaintext through the usage of an algorithm

    What Is Ciphertext?

    In the world of cryptography, the ciphertext is a result of encryption that has been performed on plaintext through the usage of an algorithm, and this algorithm is known as a cipher.

    Ciphertext is known as encrypted as well as encoded information due to the fact that it contains the original plaintext which is unreadable by an unauthorized party, or in other words, a person or a computer that does not have the proper cipher in order to decrypt it.

    Decryption is the process of turning a ciphertext into a readable plaintext.

    A cipher by itself is an algorithm that can be applied to plaintext in order to achieve ciphertext. It is the unreadable output of an encryption algorithm. 

    Keep in mind that earlier cipher algorithms that were performed manually differ from the modern algorithms that are executed through the usage of a machine. 

    One type of cipher is a substitution cipher, which offers an alternative to plaintext. Then there’s a polyalphabetic substitution cipher, where a mixed alphabet is used to encrypt the plaintext, where at random points it will change to a different mixed alphabet that indicates the change with an uppercase letter.

    Then there’s the transposition cipher, which is known as a rail fence cipher and is a permutation of the plaintext.

    There’s also a permutation cipher, where the positions which are held by the plaintext are shifted to a regular system so that the ciphertext constitutes a permutation of the plaintext itself.

    In private-key cryptography, the attacker is aware of the plaintext and the corresponding ciphertext. The sender, as well as the receiver, has a pre-shared key, and this key is kept secret from anyone else. DES and AES are algorithms that are used in his type of encryption. 

    In public-key cryptography, two different keys (the private key and the public key) are used for the encryption and the decryption process itself, where the sender uses the public key in order to perform the encryption and the receiver does not know the private key.

    Back to Glossary Index Page

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Add A Comment
    Leave A Reply Cancel Reply

    Top News

    Brazil Defies Trump Tariff Threats, Backs Dollar-Free BRICS Trade

    June 7, 2025

    Michael Saylor’s Strategy Announces $979,700,000 Stock Offering in a Bid to Acquire More Bitcoin (BTC)

    June 7, 2025

    Bitcoin Layer 2: Ark

    June 7, 2025
    Advertisement
    Demo
    Crypto Chain Post
    • Home
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Crypto Chain Post. All Rights Reserved.

    71-75 Shelton Street, Covent Garden, London United Kingdom, WC2H 9JQ

    Type above and press Enter to search. Press Esc to cancel.