Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 171

Cipher

What is Cipher?

CipherAlgorithm that transforms plaintext into ciphertext (encryption) and back (decryption), parameterized by one or more cryptographic keys.


A cipher is the algorithm that performs encryption and decryption. Modern ciphers fall into symmetric (single shared key, e.g., AES, ChaCha20, 3DES) and asymmetric (public/private key pair, e.g., RSA, ECC) families, and into block ciphers (fixed-size blocks, e.g., AES-128) or stream ciphers (one bit/byte at a time, e.g., ChaCha20). A cipher is typically composed with a mode of operation (CBC, GCM, CTR) and key-derivation, MAC, or AEAD construction to achieve confidentiality and integrity together. Choosing a strong cipher today means AEAD constructions like AES-GCM, AES-GCM-SIV, or ChaCha20-Poly1305 with proper IV/nonce handling.

Examples

  1. 01

    TLS 1.3 cipher suite TLS_AES_128_GCM_SHA256.

  2. 02

    Disk encryption using AES-XTS-256.

Frequently asked questions

What is Cipher?

Algorithm that transforms plaintext into ciphertext (encryption) and back (decryption), parameterized by one or more cryptographic keys. It belongs to the Cryptography category of cybersecurity.

What does Cipher mean?

Algorithm that transforms plaintext into ciphertext (encryption) and back (decryption), parameterized by one or more cryptographic keys.

How does Cipher work?

A cipher is the algorithm that performs encryption and decryption. Modern ciphers fall into symmetric (single shared key, e.g., AES, ChaCha20, 3DES) and asymmetric (public/private key pair, e.g., RSA, ECC) families, and into block ciphers (fixed-size blocks, e.g., AES-128) or stream ciphers (one bit/byte at a time, e.g., ChaCha20). A cipher is typically composed with a mode of operation (CBC, GCM, CTR) and key-derivation, MAC, or AEAD construction to achieve confidentiality and integrity together. Choosing a strong cipher today means AEAD constructions like AES-GCM, AES-GCM-SIV, or ChaCha20-Poly1305 with proper IV/nonce handling.

How do you defend against Cipher?

Defences for Cipher typically combine technical controls and operational practices, as detailed in the full definition above.

Related terms

See also