Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 173

Ciphertext

What is Ciphertext?

CiphertextOutput of an encryption algorithm: data that should be unintelligible to anyone without the correct key.


Ciphertext is the encrypted form of plaintext produced by a cipher under a specific key, mode, and (when applicable) nonce or IV. A well-designed cipher makes ciphertext computationally indistinguishable from random data without the key. Ciphertext alone does not guarantee security: it must be paired with proper key management, authenticated encryption (e.g., AES-GCM, ChaCha20-Poly1305) to detect tampering, and unique nonces per message. Famous attacks against weak ciphertext handling include padding-oracle attacks on CBC, BEAST, POODLE on SSL 3.0, and key-reuse breaks in stream ciphers. Modern systems should reject any ciphertext whose authentication tag fails verification.

Examples

  1. 01

    A TLS record carrying AES-256-GCM ciphertext between client and server.

  2. 02

    An encrypted backup file whose ciphertext is safe to store in untrusted object storage.

Frequently asked questions

What is Ciphertext?

Output of an encryption algorithm: data that should be unintelligible to anyone without the correct key. It belongs to the Cryptography category of cybersecurity.

What does Ciphertext mean?

Output of an encryption algorithm: data that should be unintelligible to anyone without the correct key.

How does Ciphertext work?

Ciphertext is the encrypted form of plaintext produced by a cipher under a specific key, mode, and (when applicable) nonce or IV. A well-designed cipher makes ciphertext computationally indistinguishable from random data without the key. Ciphertext alone does not guarantee security: it must be paired with proper key management, authenticated encryption (e.g., AES-GCM, ChaCha20-Poly1305) to detect tampering, and unique nonces per message. Famous attacks against weak ciphertext handling include padding-oracle attacks on CBC, BEAST, POODLE on SSL 3.0, and key-reuse breaks in stream ciphers. Modern systems should reject any ciphertext whose authentication tag fails verification.

How do you defend against Ciphertext?

Defences for Ciphertext typically combine technical controls and operational practices, as detailed in the full definition above.

Related terms