Expressvpn Glossary

Ciphertext

Ciphertext

What is ciphertext?

Ciphertext is data that has been converted from readable plaintext into an unreadable form by an encryption algorithm. Its core purpose is to prevent unauthorized parties from accessing or understanding the information while it is stored or transmitted.

How does ciphertext work?

Ciphertext isn’t a process, but the end result of running plaintext through a series of controlled steps based on an encryption key. These steps can include rearranging the data, substituting characters or bits, and performing mathematical operations that scramble the structure of the original message.

The output, which is the ciphertext, appears random to an observer without the key and can’t be interpreted without the matching decryption key, which guides the algorithm in reversing those steps and reconstructing the plaintext.A flow chart showing plaintext being encrypted with a key to become ciphertext, which is then decrypted with the same key to become plaintext again.

Types of encryption that generate ciphertext

Two main forms of encryption produce ciphertext. Each relies on different key structures and is used in different parts of modern security systems.

  • Symmetric encryption: Uses one shared key for both encryption and decryption. It is efficient and suited to situations where the key can be distributed securely in advance. Common uses include full-disk encryption and other high-volume data protection tasks.
  • Asymmetric encryption: Uses a public key to encrypt data and a private key to decrypt it. The separation of keys allows secure communication over open networks. It is used in secure key exchange.

Why is ciphertext important?

Ciphertext protects the confidentiality of data in digital systems by ensuring that intercepted or improperly accessed information can’t be understood without the correct decryption key. It supports secure activities such as online transactions, private communication, corporate data exchange, and remote access. It also helps organizations comply with data-protection requirements by keeping sensitive information unreadable to unauthorized parties.

Security and privacy considerations

The security of the ciphertext depends on the strength of the encryption method and the secrecy of the keys. Weak or outdated designs are vulnerable to brute-force attacks (systematically guessing the key), and they can also allow attackers to recover parts of the plaintext or even the key itself.

Modern algorithms like 256-bit Advanced Encryption Standard (AES) and 2048-bit Rivest-Shamir-Adleman (RSA) remain secure against current attacks when properly implemented and used. However, future large-scale quantum computers may be able to compromise some public-key algorithms like RSA, which is why post-quantum algorithms are being designed.

Further reading

FAQ

What’s the difference between ciphertext and encryption?

Encryption is the process of converting plaintext into ciphertext, while ciphertext is the result of that process. To read the original message, the ciphertext must be decrypted using the correct key.

Can ciphertext be decrypted without the key?

For ciphertext created with strong, modern encryption, it’s practically impossible to decrypt it without the correct decryption key. An attacker would need to guess the key, and for an algorithm like 256-bit Advanced Encryption Standard (AES), the number of possible keys is so large that it would take the world's most powerful computers billions of years to try every combination.

Does virtual private network (VPN) traffic use ciphertext?

Yes. A VPN works by creating a secure, encrypted tunnel for internet traffic. All data sent through this tunnel is converted into ciphertext, making its contents unreadable to internet service providers (ISPs), network administrators, or anyone else trying to monitor activity, though some connection metadata may still be visible.

Is ciphertext the same as a hash?

No, they’re different, and this is an important concept in cryptography basics. Ciphertext is designed to be reversible; it can be decrypted back into its original plaintext using the correct key. A hash is a one-way function that creates a unique, fixed-length “fingerprint” of the data. A hash cannot be reversed to reveal the original message.
Get Started