# plaintext

Also found in: Dictionary, Thesaurus, Medical, Legal, Wikipedia.

## plaintext

[′plān‚tekst]
(communications)
The form of a message in which it can be generally understood, before it has been transformed by a code or cipher into a form in which it can be read only by those privy to the secrets of the cipher.
(computer science)
Data that are to be encrypted.

## plaintext

(cryptography)
A message before encryption or after decryption, i.e. in its usual form which anyone can read, as opposed to its encrypted form ("ciphertext").

## plaintext

(1) (plain text) Text that contains no formatting. See text email.

(2) (plaintext) Data about to be encrypted. Plaintext can be viewed by any application that supports the file format. Contrast with "ciphertext," which is encrypted data. The reason "text" is in both terms is because the early forms of encryption dealt with communicating text messages. Today, all kinds of data are encrypted, including the contents of an entire storage drive. See cryptography.

Plaintext Becomes Ciphertext In this secret key example, the XOR operator turns plaintext into ciphertext and back to plaintext. In practice, XOR may be used but in combination with other mathematical operations. See XOR.
References in periodicals archive ?
The left inverse matrix of [P.sub.2] is calculated and denoted as [P.sup.-1.sub.2], and the speech plaintext matrices [M.sub.f] are encrypted using the key [P.sub.1] and [P.sup.-1.sub.2], obtaining the speech cipher-text matrices [C.sub.f] as follows:
Definition 2: Let a and b be integers such that a is a secret key to encrypt a plaintext x and b = [c.sub.a] (x) is a ciphertext, we then have a *d b = [c.sup.-1.sub.a] (b) = x
To resolve this problem, there is a bootstrapping function to reduce the noise and get a fresh ciphertext from the noisy ciphertext corresponding to the same plaintext. The fresh ciphertext can continue to allow us to apply a homomorphic operation until the noise is not over the limitation.
file that cannot be decrypted to any plaintext at all (even a
RC4 encryption processes plaintext quickly if the characters on the plaintext are not long.
A compact encryption scheme E encrypts the plaintext according to the encryption method in scheme E.
PRGA of RC4 Inputs: State, Plaintext i Outputs: Key sequence (K sequence) 1.
A second attack takes advantage of flaws in OpenPGP and S/MIME to inject malicious text that in turn makes it possible to steal the plaintext of encrypted emails.
If the total number of plaintext blocks is N, it can be written as N = n1 + n2 + n3 + n4.
If the size of the plaintext is 512 x 512, then the key space of K-image is also 512 x 512 x [2.sup.8] = [2.sup.26].
(2) The Initial Transformation is performed to transform the 64-bit plaintext P to the input of the first round [X.sub.0 by using four bytes whitening keys [WK.sub.0], [WK.sub.1], [WK.sub.2], and [WK.sub.3].

Site: Follow: Share:
Open / Close