Ciphertext What is Cipher Text (Ciphertext)? Webopedia Definition

Never miss a great news story!
Get instant notifications from Economic Times
Allow Not now

You can switch off notifications anytime using browser settings.

SECTIONS

ET APPS

ET Android App ET iPhone App ET iPad App ET Wealth Android App ET Blackberry App ET Markets Android App ET Markets iPhone App ET Money Android App
ENGLISH

हिन्दी ગુજરાતી
E-PAPER
ET PRIME
SIGN-IN
FOLLOW US

FACEBOOK TWITTER YOUTUBE LINKEDIN GOOGLE PLUS RSS
The Economic Times

Ciphertext

LATEST NEWS

  • Odisha government to withdraw cases against Abhijit Iyer-Mitra
  • This is probably India’s best chance to win a Test series Down Under but they should take nothing for granted
  • China keen to import more from India to bridge high trade deficit
  • Hegerberg gets Ballon d’Or, but Norway star still set to snub World Cup
  • France and Germany aim to keep digital tax alive with new proposal: Source
  • LJP can sacrifice seats in Bihar: Ram Vilas Paswan
  • Nothing strange about back series GDP data, says Niti Aayog’s Rajiv Kumar
  • Nissan Motor delays decision on Carlos Ghosn successor
Business News Definitions Security Ciphertext

04:04 PM | 04 Dec

market stats

SENSEX

36,134 -106.69

NIFTY 50

10,870 -14.25

GOLD (MCX) (Rs/10g.)

31,019 271.00

USD/INR

70.49 0.03

DID YOU KNOW?

Unleash the power of SIP – Invest in Mutual funds

Sponsored

★★★★★
DSP Focus Direct Plan-Growth

Class:

Equity

Category:

Multi Cap

NAV

₹22.77

Returns
9.66%
Start SIP

*Regulatory Disclaimers .

Portfolio

Loading…
Select Portfolio and Asset Combination for Display on Market Band
Select Portfolio
Select Asset Class
Show More
CREATE PORTFOLIO
ADD INVESTMENT

CHOOSE LANGUAGE

ENG

  • ENG – English
  • HIN – हिन्दी
  • GUJ – ગુજરાતી
  • MAR – मराठी
  • BEN – বাংলা
  • KAN – ಕನ್ನಡ
  • ORI – ଓଡିଆ
  • TEL – తెలుగు
  • TAM – தமிழ்
Drag according to your convenience

ET NOW RADIO
ET NOW
TIMES NOW

    Categories

    • Glossary
    • Economy
    • Equity
    • Insurance
    • Budget
    • Marketing
    • Mutual Fund
    • Space Technology
    • Testing
    • Human Resource
    • Finance
    • Security
    • Real Estate
    • Commodity
    • Sports
    • Software Development
    • Analytics
    • Entertainment
    • HR
    • Transportation
    • Astronomy
    • Shipping
    • Mathematics
    • Retail
    • Education

    Suggest a new Definition

    Proposed definitions will be considered for inclusion in the Economictimes.com

    Security
    • PREV DEFINITION
      Buffer Overflow

      Read More

    • NEXT DEFINITION
      Clickjacking

      Read More

    Definition of ‘Ciphertext’

    Definition: Cipher is an algorithm which is applied to plain text to get ciphertext. It is the unreadable output of an encryption algorithm. The term “cipher” is sometimes used as an alternative term for ciphertext. Ciphertext is not understandable until it has been converted into plain text using a key.

    Description: Earlier cipher algorithms were performed manually and were entirely different from modern algorithms which are generally executed by a machine. Different types of ciphers exist, some of which are:

    Substitution Cipher: This offers an alternative to the plaintext. It is also known as Caesar cipher.

    Polyalphabetic Substitution Cipher: In this cipher, a mixed alphabet is used to encrypt the plaintext, but at random points it would change to a different mixed alphabet which indicates the change with an uppercase letter in the Ciphertext.

    Transposition Cipher: This cipher is also known as Rail Fence Cipher and is a permutation of the plaintext.

    Permutation Cipher: The positions held by plaintext are shifted to a regular system in this cipher so that the ciphertext constitutes a permutation of the plaintext.

    Private-key Cryptography: In this cipher, even the attacker is aware of the plaintext and corresponding ciphertext. The sender and receiver must have a pre-shared key. The shared key is kept secret from all other parties and is used for encryption as well as decryption. DES and AES algorithms are examples of this type of cipher. This cryptography is also known as “symmetric key algorithm”.

    Public-key Cryptography: In this cipher, two different keys – public key and private key – are used for encryption and decryption. The sender uses the public key to perform encryption, whereas the receiver is kept in the dark about the private key. This is also known as asymmetric key algorithm.

    • PREV DEFINITION
      Buffer Overflow

      Read More

    • NEXT DEFINITION
      Clickjacking

      Read More

    Related Definitions
    • Hacking

      Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

      Description: To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security

      Secure Sockets Layer (ssl)

      Secure Sockets Layer (SSL) is a protocol developed by Netscape for establishing an encrypted link between a web server and a browser. SSL is an industry standard which transmits private data securely over the Internet by encrypting it. It is used by many websites to protect the online transactions of their customers.

      Description: SSL functions around a cryptographic system which uses three keys t

      Cross-site Scripting

      Cross-site scripting (XSS) is a type of computer security vulnerability. It is accounted for almost 85% of all website security vulnerabilities.

      Description: Cross-site scripting (XSS) exploits the ‘same-origin-policy’ concept of web applications to allow hackers to extract information from the system.

      How it works: Attackers conduct script injection that runs at the client side and is sometimes

      Dns Spoofing

      DNS Spoofing is a type of computer attack wherein a user is forced to navigate to a fake website disguised to look like a real one, with the intention of diverting traffic or stealing credentials of the users. Spoofing attacks can go on for a long period of time without being detected and can cause serious security issues.

      Description: Domain Name Server (DNS) resolves the alphabetical domain nam

    • Ciphertext

      Cipher is an algorithm which is applied to plain text to get ciphertext. It is the unreadable output of an encryption algorithm. The term “cipher” is sometimes used as an alternative term for ciphertext. Ciphertext is not understandable until it has been converted into plain text using a key.

      Description: Earlier cipher algorithms were performed manually and were entirely different from modern al

      Computer Worm

      A computer worm is a malicious, self-replicating software program (popularly termed as ‘malware’) which affects the functions of software and hardware programs.

      Description: It fits the description of a computer virus in many ways. For example, it can also self-replicate itself and spread across networks. That is why worms are often referred to as viruses also. But computer worms are different fr

      Computer Virus

      A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.

      Description: The term ‘computer virus’ was first formally defined by Fred Cohen in 1983. Computer viruses never occur naturally. They are always induced by people. Once created and released, however, their diffusion is not directly under human control. After

      Denial-of-service Attack

      Denial-Of-Service (DoS) is an attack targeted at depriving legitimate users from online services. It is done by flooding the network or server with useless and invalid authentication requests which eventually brings the whole network down, resulting in no connectivity. As a result of this, users are prevented from using a service.

      Description: A DoS attack is initiated by sending needless and sup

    • Memory Corruption

      Memory corruption can be described as the vulnerability that may occur in a computer system when its memory is altered without an explicit assignment. The contents of a memory location are modified due to programming errors which enable attackers to execute an arbitrary code.

      Description: Memory corruption bugs mostly occur in low-level programming languages like C or C++. It is one of the proble

      Trojan

      Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive data and corrupting file allocation systems.

      Description: Mostly Trojans are

    Loading
    Please wait…

    Not to be Missed

    L&T Construction wins orders worth Rs 1,127 crore L&T Construction wins orders worth Rs 1,127 crore
    Sun Pharma plunges 9% on news Sebi may reopen insider trading case Sun Pharma plunges 9% on news Sebi may reopen insider trading case
    Farewell, Jodhpur! Priyanka-Nick's wedding guests, Kevin Jonas, Parineeti Chopra, head to Delhi for reception Farewell, Jodhpur! Priyanka-Nick’s wedding guests, Kevin Jonas, Parineeti Chopra, head to Delhi for reception
    Have a question on P2P? Ask our experts! Have a question on P2P? Ask our experts!
    Priyanka Chopra, Nick Jonas tie the knot in a Hindu ceremony; go traditional with a 'haldi-chooda' function Priyanka Chopra, Nick Jonas tie the knot in a Hindu ceremony; go traditional with a ‘haldi-chooda’ function
    A step-by-step guide to make your first P2P investment A step-by-step guide to make your first P2P investment
    • Digg
    • Google Bookmarks
    • StumbleUpon
    • Reddit
    • Newsvine
    • Live Bookmarks
    • Technorati
    • Yahoo Bookmarks
    • Blogmarks
    • Del.icio.us
    • ApnaCircle

    Mail this Definition

    My Saved Definitions

    Get a Quote

    Browse Companies

    A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | 1 2 3 4 5 6 7 8 9

    Browse Mutual Funds

    A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

    • Digg
    • Google Bookmarks
    • StumbleUpon
    • Reddit
    • Newsvine
    • Live Bookmarks
    • Technorati
    • Yahoo Bookmarks
    • Blogmarks
    • Del.icio.us
    • ApnaCircle

    Mail this Definition

    My Saved Definitions

    –>

    Logout

    Never miss a great news story!
    Get instant notifications from Economic Times
    Allow Not now

    You can switch off notifications anytime using browser settings.

    SECTIONS

    ET APPS

    ET Android App ET iPhone App ET iPad App ET Wealth Android App ET Blackberry App ET Markets Android App ET Markets iPhone App ET Money Android App
    ENGLISH

    हिन्दी ગુજરાતી
    E-PAPER
    ET PRIME
    SIGN-IN
    FOLLOW US

    FACEBOOK TWITTER YOUTUBE LINKEDIN GOOGLE PLUS RSS
    The Economic Times

    Ciphertext

    LATEST NEWS

    • Odisha government to withdraw cases against Abhijit Iyer-Mitra
    • This is probably India’s best chance to win a Test series Down Under but they should take nothing for granted
    • China keen to import more from India to bridge high trade deficit
    • Hegerberg gets Ballon d’Or, but Norway star still set to snub World Cup
    • France and Germany aim to keep digital tax alive with new proposal: Source
    • LJP can sacrifice seats in Bihar: Ram Vilas Paswan
    • Nothing strange about back series GDP data, says Niti Aayog’s Rajiv Kumar
    • Nissan Motor delays decision on Carlos Ghosn successor
    Business News Definitions Security Ciphertext

    04:04 PM | 04 Dec

    market stats

    SENSEX

    36,134 -106.69

    NIFTY 50

    10,870 -14.25

    GOLD (MCX) (Rs/10g.)

    31,019 271.00

    USD/INR

    70.49 0.03

    DID YOU KNOW?

    Unleash the power of SIP – Invest in Mutual funds

    Sponsored

    ★★★★★
    DSP Focus Direct Plan-Growth

    Class:

    Equity

    Category:

    Multi Cap

    NAV

    ₹22.77

    Returns
    9.66%
    Start SIP

    *Regulatory Disclaimers .

    Portfolio

    Loading…
    Select Portfolio and Asset Combination for Display on Market Band
    Select Portfolio
    Select Asset Class
    Show More
    CREATE PORTFOLIO
    ADD INVESTMENT

    CHOOSE LANGUAGE

    ENG

    • ENG – English
    • HIN – हिन्दी
    • GUJ – ગુજરાતી
    • MAR – मराठी
    • BEN – বাংলা
    • KAN – ಕನ್ನಡ
    • ORI – ଓଡିଆ
    • TEL – తెలుగు
    • TAM – தமிழ்
    Drag according to your convenience

    ET NOW RADIO
    ET NOW
    TIMES NOW

      Categories

      • Glossary
      • Economy
      • Equity
      • Insurance
      • Budget
      • Marketing
      • Mutual Fund
      • Space Technology
      • Testing
      • Human Resource
      • Finance
      • Security
      • Real Estate
      • Commodity
      • Sports
      • Software Development
      • Analytics
      • Entertainment
      • HR
      • Transportation
      • Astronomy
      • Shipping
      • Mathematics
      • Retail
      • Education

      Suggest a new Definition

      Proposed definitions will be considered for inclusion in the Economictimes.com

      Security
      • PREV DEFINITION
        Buffer Overflow

        Read More

      • NEXT DEFINITION
        Clickjacking

        Read More

      Definition of ‘Ciphertext’

      Definition: Cipher is an algorithm which is applied to plain text to get ciphertext. It is the unreadable output of an encryption algorithm. The term “cipher” is sometimes used as an alternative term for ciphertext. Ciphertext is not understandable until it has been converted into plain text using a key.

      Description: Earlier cipher algorithms were performed manually and were entirely different from modern algorithms which are generally executed by a machine. Different types of ciphers exist, some of which are:

      Substitution Cipher: This offers an alternative to the plaintext. It is also known as Caesar cipher.

      Polyalphabetic Substitution Cipher: In this cipher, a mixed alphabet is used to encrypt the plaintext, but at random points it would change to a different mixed alphabet which indicates the change with an uppercase letter in the Ciphertext.

      Transposition Cipher: This cipher is also known as Rail Fence Cipher and is a permutation of the plaintext.

      Permutation Cipher: The positions held by plaintext are shifted to a regular system in this cipher so that the ciphertext constitutes a permutation of the plaintext.

      Private-key Cryptography: In this cipher, even the attacker is aware of the plaintext and corresponding ciphertext. The sender and receiver must have a pre-shared key. The shared key is kept secret from all other parties and is used for encryption as well as decryption. DES and AES algorithms are examples of this type of cipher. This cryptography is also known as “symmetric key algorithm”.

      Public-key Cryptography: In this cipher, two different keys – public key and private key – are used for encryption and decryption. The sender uses the public key to perform encryption, whereas the receiver is kept in the dark about the private key. This is also known as asymmetric key algorithm.

      • PREV DEFINITION
        Buffer Overflow

        Read More

      • NEXT DEFINITION
        Clickjacking

        Read More

      Related Definitions
      • Hacking

        Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

        Description: To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security

        Secure Sockets Layer (ssl)

        Secure Sockets Layer (SSL) is a protocol developed by Netscape for establishing an encrypted link between a web server and a browser. SSL is an industry standard which transmits private data securely over the Internet by encrypting it. It is used by many websites to protect the online transactions of their customers.

        Description: SSL functions around a cryptographic system which uses three keys t

        Cross-site Scripting

        Cross-site scripting (XSS) is a type of computer security vulnerability. It is accounted for almost 85% of all website security vulnerabilities.

        Description: Cross-site scripting (XSS) exploits the ‘same-origin-policy’ concept of web applications to allow hackers to extract information from the system.

        How it works: Attackers conduct script injection that runs at the client side and is sometimes

        Dns Spoofing

        DNS Spoofing is a type of computer attack wherein a user is forced to navigate to a fake website disguised to look like a real one, with the intention of diverting traffic or stealing credentials of the users. Spoofing attacks can go on for a long period of time without being detected and can cause serious security issues.

        Description: Domain Name Server (DNS) resolves the alphabetical domain nam

      • Ciphertext

        Cipher is an algorithm which is applied to plain text to get ciphertext. It is the unreadable output of an encryption algorithm. The term “cipher” is sometimes used as an alternative term for ciphertext. Ciphertext is not understandable until it has been converted into plain text using a key.

        Description: Earlier cipher algorithms were performed manually and were entirely different from modern al

        Computer Worm

        A computer worm is a malicious, self-replicating software program (popularly termed as ‘malware’) which affects the functions of software and hardware programs.

        Description: It fits the description of a computer virus in many ways. For example, it can also self-replicate itself and spread across networks. That is why worms are often referred to as viruses also. But computer worms are different fr

        Computer Virus

        A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.

        Description: The term ‘computer virus’ was first formally defined by Fred Cohen in 1983. Computer viruses never occur naturally. They are always induced by people. Once created and released, however, their diffusion is not directly under human control. After

        Denial-of-service Attack

        Denial-Of-Service (DoS) is an attack targeted at depriving legitimate users from online services. It is done by flooding the network or server with useless and invalid authentication requests which eventually brings the whole network down, resulting in no connectivity. As a result of this, users are prevented from using a service.

        Description: A DoS attack is initiated by sending needless and sup

      • Memory Corruption

        Memory corruption can be described as the vulnerability that may occur in a computer system when its memory is altered without an explicit assignment. The contents of a memory location are modified due to programming errors which enable attackers to execute an arbitrary code.

        Description: Memory corruption bugs mostly occur in low-level programming languages like C or C++. It is one of the proble

        Trojan

        Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive data and corrupting file allocation systems.

        Description: Mostly Trojans are

      Loading
      Please wait…

      Not to be Missed

      L&T Construction wins orders worth Rs 1,127 crore L&T Construction wins orders worth Rs 1,127 crore
      Sun Pharma plunges 9% on news Sebi may reopen insider trading case Sun Pharma plunges 9% on news Sebi may reopen insider trading case
      Farewell, Jodhpur! Priyanka-Nick's wedding guests, Kevin Jonas, Parineeti Chopra, head to Delhi for reception Farewell, Jodhpur! Priyanka-Nick’s wedding guests, Kevin Jonas, Parineeti Chopra, head to Delhi for reception
      Have a question on P2P? Ask our experts! Have a question on P2P? Ask our experts!
      Priyanka Chopra, Nick Jonas tie the knot in a Hindu ceremony; go traditional with a 'haldi-chooda' function Priyanka Chopra, Nick Jonas tie the knot in a Hindu ceremony; go traditional with a ‘haldi-chooda’ function
      A step-by-step guide to make your first P2P investment A step-by-step guide to make your first P2P investment
      • Digg
      • Google Bookmarks
      • StumbleUpon
      • Reddit
      • Newsvine
      • Live Bookmarks
      • Technorati
      • Yahoo Bookmarks
      • Blogmarks
      • Del.icio.us
      • ApnaCircle

      Mail this Definition

      My Saved Definitions

      Get a Quote

      Browse Companies

      A B C D E F G H I J K L M N O P Q R S T U V W X Y Z | 1 2 3 4 5 6 7 8 9

      Browse Mutual Funds

      A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

      • Digg
      • Google Bookmarks
      • StumbleUpon
      • Reddit
      • Newsvine
      • Live Bookmarks
      • Technorati
      • Yahoo Bookmarks
      • Blogmarks
      • Del.icio.us
      • ApnaCircle

      Mail this Definition

      My Saved Definitions

      –>

      Logout