encryption

(redirected from Cipher text)
Also found in: Dictionary, Thesaurus, Medical, Financial, Acronyms.

encryption

[en′krip·shən]
(computer science)
The coding of a clear text message by a transmitting unit so as to prevent unauthorized eavesdropping along the transmission line; the receiving unit uses the same algorithm as the transmitting unit to decode the incoming message.

encryption

(algorithm, cryptography)
Any procedure used in cryptography to convert plaintext into ciphertext (encrypted message) in order to prevent any but the intended recipient from reading that data.

Schematically, there are two classes of encryption primitives: public-key cryptography and private-key cryptography; they are generally used complementarily. Public-key encryption algorithms include RSA; private-key algorithms include the obsolescent Data Encryption Standard, the Advanced Encryption Standard, as well as RC4.

The Unix command crypt performs a weak form of encryption. Stronger encryption programs include Pretty Good Privacy and the GNU Privacy Guard.

Other closely related aspects of cryptograph include message digests.

encryption

The reversible transformation of data from the original (plaintext) to a difficult-to-interpret format (ciphertext) as a mechanism for protecting its confidentiality, integrity and sometimes its authenticity. Encryption uses an encryption algorithm and one or more encryption keys. See encryption algorithm and cryptography.
References in periodicals archive ?
The reason of file size increase is that merged class has more possible values for cipher text.
Plain Text A B C D E F G H I J K L M N O P Q R S T U V W X Y Z B C D E F G H I J K L M N O P Q R S T U V W X Y Z A Cipher Text
Cipher text * Encrypted information - what you are willing to let be seen - also called "black" data.
32] blocks of cipher text C(P[direct sum][DELTA]P) via (13), (33), (32), (31), and (30).
It is assumed that no one modifies or shuffle the cipher text sequence.
Each encrypted block is XORed with the previous block of cipher text.
These measures can only be expected to converge when large samples of cipher text are available.
It is impossible to decrypt the cipher text without either of these two things (either secret key or security device).
The main components of the symmetric encryption include-plaintext, encryption algorithm, secret key, cipher text and decryption algorithm.
In the original example, the key is "3" If the key is changed to "7", the cipher text would be:
Product innovation is key to our continued commitment to meeting our customers' needs as evidenced by our recent addition to the nuBridges Protect product line--nuBridges Protect Token Manager--a new module that allows companies to further protect encrypted data by removing cipher text from applications and databases where it is more vulnerable to unauthorized decryption and theft, and storing it in a central data vault.
Consequently, using previous HIBE systems [GS02, BB04a], cipher text in this forward secure construction are of size O(t) private keys are of size O(t2) but can be reduced to size O(t) by using updateable public storage [10][11][13].