Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Ciphertext

Index Ciphertext

In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. [1]

49 relations: Abraham Sinkov, Adaptive chosen-ciphertext attack, Advanced Encryption Standard, Algorithm, Attack model, Babington Plot, Beale ciphers, Block cipher, Brute-force attack, Caesar cipher, Certified Information Systems Security Professional, Chosen-ciphertext attack, Chosen-plaintext attack, Cipher, Ciphertext-only attack, Classical cipher, Code (cryptography), Cryptogram, Cryptography, Cryptosystem, Data Encryption Standard, David Kahn (writer), Encryption, Enigma machine, History of cryptography, Key (cryptography), Known-plaintext attack, Kryptos, One-time pad, Password cracking, Permutation, Plaintext, Playfair cipher, Polyalphabetic cipher, Polygraphic substitution, Public-key cryptography, Rail fence cipher, Related-key attack, RSA (cryptosystem), Shugborough inscription, Stream cipher, Substitution cipher, Symmetric-key algorithm, The Gold-Bug, The Magic Words are Squeamish Ossifrage, Transposition cipher, Vigenère cipher, Zimmermann Telegram, Zodiac Killer.

Abraham Sinkov

Abraham "Abe" Sinkov (August 22, 1907 – January 19, 1998) was a US cryptanalyst.

New!!: Ciphertext and Abraham Sinkov · See more »

Adaptive chosen-ciphertext attack

An adaptive chosen-ciphertext attack (abbreviated as CCA2) is an interactive form of chosen-ciphertext attack in which an attacker sends a number of ciphertexts to be decrypted, then uses the results of these decryptions to select subsequent ciphertexts.

New!!: Ciphertext and Adaptive chosen-ciphertext attack · See more »

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

New!!: Ciphertext and Advanced Encryption Standard · See more »

Algorithm

In mathematics and computer science, an algorithm is an unambiguous specification of how to solve a class of problems.

New!!: Ciphertext and Algorithm · See more »

Attack model

In cryptanalysis, attack models or attack types are a classification of cryptographic attacks specifying the kind of access a cryptanalyst has to a system under attack when attempting to "break" an encrypted message (also known as ciphertext) generated by the system.

New!!: Ciphertext and Attack model · See more »

Babington Plot

The Babington Plot was a plan in 1586 to assassinate Queen Elizabeth I, a Protestant, and put Mary, Queen of Scots, her Roman Catholic cousin, on the English throne.

New!!: Ciphertext and Babington Plot · See more »

Beale ciphers

The Beale ciphers, also referred to as the Beale Papers, are a set of three ciphertexts, one of which allegedly states the location of a buried treasure of gold, silver and jewels estimated to be worth over US$43 million.

New!!: Ciphertext and Beale ciphers · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: Ciphertext and Block cipher · See more »

Brute-force attack

In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.

New!!: Ciphertext and Brute-force attack · See more »

Caesar cipher

E in the plaintext becomes B in the ciphertext.

New!!: Ciphertext and Caesar cipher · See more »

Certified Information Systems Security Professional

Certified Information Systems Security Professional (CISSP) is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)².

New!!: Ciphertext and Certified Information Systems Security Professional · See more »

Chosen-ciphertext attack

A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis where the cryptanalyst can gather information by obtaining the decryptions of chosen ciphertexts.

New!!: Ciphertext and Chosen-ciphertext attack · See more »

Chosen-plaintext attack

A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts.

New!!: Ciphertext and Chosen-plaintext attack · See more »

Cipher

In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

New!!: Ciphertext and Cipher · See more »

Ciphertext-only attack

In cryptography, a ciphertext-only attack (COA) or known ciphertext attack is an attack model for cryptanalysis where the attacker is assumed to have access only to a set of ciphertexts.

New!!: Ciphertext and Ciphertext-only attack · See more »

Classical cipher

In cryptography, a classical cipher is a type of cipher that was used historically but now has fallen, for the most part, into disuse.

New!!: Ciphertext and Classical cipher · See more »

Code (cryptography)

Cryptography in simple terms means the use of any alphabet or numerical statement which has a meaning or stores a message.

New!!: Ciphertext and Code (cryptography) · See more »

Cryptogram

A cryptogram is a type of puzzle that consists of a short piece of encrypted text.

New!!: Ciphertext and Cryptogram · See more »

Cryptography

Cryptography or cryptology (from κρυπτός|translit.

New!!: Ciphertext and Cryptography · See more »

Cryptosystem

In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality (encryption).

New!!: Ciphertext and Cryptosystem · See more »

Data Encryption Standard

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.

New!!: Ciphertext and Data Encryption Standard · See more »

David Kahn (writer)

David Kahn (b. February 7, 1930*) is a US historian, journalist and writer.

New!!: Ciphertext and David Kahn (writer) · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Ciphertext and Encryption · See more »

Enigma machine

The Enigma machines were a series of electro-mechanical rotor cipher machines developed and used in the early- to mid-20th century to protect commercial, diplomatic and military communication.

New!!: Ciphertext and Enigma machine · See more »

History of cryptography

Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago.

New!!: Ciphertext and History of cryptography · See more »

Key (cryptography)

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.

New!!: Ciphertext and Key (cryptography) · See more »

Known-plaintext attack

The known-plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has access to both the plaintext (called a crib), and its encrypted version (ciphertext).

New!!: Ciphertext and Known-plaintext attack · See more »

Kryptos

Kryptos is a sculpture by the American artist Jim Sanborn located on the grounds of the Central Intelligence Agency (CIA) in Langley, Virginia.

New!!: Ciphertext and Kryptos · See more »

One-time pad

In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a one-time pre-shared key the same size as, or longer than, the message being sent.

New!!: Ciphertext and One-time pad · See more »

Password cracking

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.

New!!: Ciphertext and Password cracking · See more »

Permutation

In mathematics, the notion of permutation relates to the act of arranging all the members of a set into some sequence or order, or if the set is already ordered, rearranging (reordering) its elements, a process called permuting.

New!!: Ciphertext and Permutation · See more »

Plaintext

In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.

New!!: Ciphertext and Plaintext · See more »

Playfair cipher

The Playfair cipher or Playfair square or Wheatstone-Playfair cipher is a manual symmetric encryption technique and was the first literal digram substitution cipher.

New!!: Ciphertext and Playfair cipher · See more »

Polyalphabetic cipher

A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets.

New!!: Ciphertext and Polyalphabetic cipher · See more »

Polygraphic substitution

A polygraphic substitution is a cipher in which a uniform substitution is performed on blocks of letters.

New!!: Ciphertext and Polygraphic substitution · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: Ciphertext and Public-key cryptography · See more »

Rail fence cipher

The rail fence cipher (also called a zigzag cipher) is a form of transposition cipher.

New!!: Ciphertext and Rail fence cipher · See more »

Related-key attack

In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the keys is known to the attacker.

New!!: Ciphertext and Related-key attack · See more »

RSA (cryptosystem)

RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.

New!!: Ciphertext and RSA (cryptosystem) · See more »

Shugborough inscription

The Shugborough Inscription is a sequence of letters – O U O S V A V V, between the letters D M – carved on the 18th-century Shepherd's Monument in the grounds of Shugborough Hall in Staffordshire, England, below a mirror image of Nicolas Poussin's painting, the Shepherds of Arcadia.

New!!: Ciphertext and Shugborough inscription · See more »

Stream cipher

A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).

New!!: Ciphertext and Stream cipher · See more »

Substitution cipher

In cryptography, a substitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the "units" may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth.

New!!: Ciphertext and Substitution cipher · See more »

Symmetric-key algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

New!!: Ciphertext and Symmetric-key algorithm · See more »

The Gold-Bug

"The Gold-Bug" is a short story by Edgar Allan Poe published in 1843.

New!!: Ciphertext and The Gold-Bug · See more »

The Magic Words are Squeamish Ossifrage

The text "The Magic Words are Squeamish Ossifrage" was the solution to a challenge ciphertext posed by the inventors of the RSA cipher in 1977.

New!!: Ciphertext and The Magic Words are Squeamish Ossifrage · See more »

Transposition cipher

In cryptography, a transposition cipher is a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext.

New!!: Ciphertext and Transposition cipher · See more »

Vigenère cipher

The Vigenère cipher is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers based on the letters of a keyword.

New!!: Ciphertext and Vigenère cipher · See more »

Zimmermann Telegram

The Zimmermann Telegram (or Zimmermann Note or Zimmerman Cable) was a secret diplomatic communication issued from the German Foreign Office in January 1917 that proposed a military alliance between Germany and Mexico in the event that the United States entered World War I against Germany.

New!!: Ciphertext and Zimmermann Telegram · See more »

Zodiac Killer

The Zodiac Killer or Zodiac was a serial killer who operated in Northern California from at least the late 1960s to the early 1970s.

New!!: Ciphertext and Zodiac Killer · See more »

Redirects here:

Cipher text, Cyphertext.

References

[1] https://en.wikipedia.org/wiki/Ciphertext

OutgoingIncoming
Hey! We are on Facebook now! »