cryptography

(redirected from plaintext)
Also found in: Dictionary, Thesaurus, Legal, Encyclopedia, Wikipedia.

cryptography

(krip-tog′ră-fē) [ crypt- + -graphy]
The science and techniques of concealing or disguising information through encoding and decoding. In the health professions cryptography is used to ensure the confidentiality of medical records.
References in periodicals archive ?
Therefore, according to the analysis of correlation coefficient, we can draw the conclusion that the effect of image encryption is much better, because the statistical characteristics between pixels of the plaintext image have ceased to exist in the cipher text image.
Together, the moves and annotations relate the story to the chess board; which is what a key does for a plaintext and a ciphertext.
By default, PlainText syncs only with a folder it creates called PlainText within your Dropbox account.
It should be noted that; all of the thirty one chosen plaintext tests contain all ASCII characters (English alphanumeric and special characters).
The use of technological controls such as encryption--the process of changing plaintext into ciphertext--can help guard against the unauthorized disclosure of sensitive information.
This is because PIN to PIN messages are not encrypted and transmit in plaintext, allowing anyone who intercepts them to read them.
On the one hand, message traffic may be stored as plaintext or XML, meaning that it is trivial to edit the contents; on the other hand, some systems use proprietary formats, which are slightly more difficult to edit but also more difficult to review and monitor.
In operation, the original SCADA message leaves the RTU and enters the SCM through the Plaintext port.
In the submitted document, plaintext was recovered by assigning an A to covertext letters appearing as Roman type and assigning a B to the covertext letters appearing as italicized or cursive writing.
on plaintext elements and homophones in hybrid code
According to researchers at the centre, it would potentially be possible for an active attacker to obtain the plaintext version of the IPsec-protected communications using only moderate effort.
Typically, data is vulnerable to hacking during hibernation as the contents of any open encrypted files and systems remain in the hibernation storage file in plaintext format.