What is ciphertext?

Ciphertext

In cryptography, ciphertext (or cyphertext) is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also known as encrypted or encoded information because it contains a form of the original plaintext that is unreadable by a human or computer without the proper cipher to decrypt it. Decryption, the inverse of encryption, is the process of turning ciphertext into readable plaintext. Ciphertext is not to be confused with codetext because the latter is a result of a Code, not a cipher.

Read more about Ciphertext.

Some articles on ciphertext:

Chosen (novel) - Cryptanalysis
... Chosen-ciphertext attack, an attack model Indifferent chosen-ciphertext attack, a form of chosen-ciphertext attack Adaptive chosen-ciphertext attack, an interactive form of chosen-cipher ...
Ciphertext Expansion
... In cryptography, the term ciphertext expansion refers to the length increase of a message when it is encrypted ... cause some degree of expansion during the encryption process, for instance when the resulting ciphertext must include a message-unique Initialization Vector (IV) ... Probabilistic encryption schemes cause ciphertext expansion, as the set of possible ciphertexts is necessarily greater than the set of input plaintexts ...
Completeness (cryptography)
... input (plaintext) is changed, every bit of the output (ciphertext) has an average of 50% probability of changing ... byte, it would only have any effect on the 8th byte of the ciphertext ... mean that if the attacker guessed 256 different plaintext-ciphertext pairs, he would always know the last byte of every 8byte sequence we send (effectively 12.5% of all our data) ...
Varieties of Chosen-ciphertext Attacks
... Chosen-ciphertext attacks, like other attacks, may be adaptive or non-adaptive ... In a non-adaptive attack, the attacker chooses the ciphertext or ciphertexts to decrypt in advance, and does not use the resulting plaintexts to inform their choice for ... In an adaptive chosen-ciphertext attack, the attacker makes their ciphertext choices adaptively, that is, depending on the result of prior decryptions ...