a message set in a directly readable form rather than in coded groups
Examples of 'plaintext' in a sentence
plaintext
And the base station obtains the plaintext query result through decryption.
Hua Dai, Tianyi Wei, Yue Huang, Jia Xu, Geng Yang 2016, 'Random Secure Comparator Selection Based Privacy-Preserving MAX/MIN Query Processingin Two-Tiered Sensor Networks', Journal of Sensorshttp://dx.doi.org/10.1155/2016/6301404. Retrieved from DOAJ CC BY 4.0 (https://creativecommons.org/licenses/by-sa/4.0/legalcode)
This intermediate state allows a legitimate user to generate the plaintext herself.
Megha Agrawal, Donghoon Chang, Jinkeon Kang 2018, 'Deterministic Authenticated Encryption Scheme for Memory Constrained Devices', Cryptographyhttps://www.mdpi.com/2410-387X/2/4/37. Retrieved from DOAJ CC BY 4.0 (https://creativecommons.org/licenses/by-sa/4.0/legalcode)
This paper presents a new chaos-based image cipher using a plaintext-related permutation.
Hasitha Muthumala Waidyasooriya, Masanori Hariyama, Kota Kasahara 2016, 'An FPGA Accelerator for Molecular Dynamics Simulation Using OpenCL', International Journal of Networked and Distributed Computing (IJNDC)https://www.atlantis-press.com/article/25866535.pdf. Retrieved from DOAJ CC BY 4.0 (https://creativecommons.org/licenses/by-sa/4.0/legalcode)
Then the length of the plaintext changes with the number of cells in the matrix.
Elwinus H. A. Mendrofa, Elwin Yunith Purba, Boy Yako Siahaan, Rahmad W Sembiring 2017, 'Collaborative Encryption Algorithm Between Vigenere Cipher, Rotation of Matrix (ROM),and One Time Pad (OTP) Algoritma', Advances in Science, Technology and Engineering Systemshttps://astesj.com/v02/i05/p03/. Retrieved from DOAJ CC BY 4.0 (https://creativecommons.org/licenses/by-sa/4.0/legalcode)
This makes that scheme naturally resist chosen plaintext attack and cipher text-only attack.
Jianyong Chen, Junwei Zhou, Kwok-Wo Wong, Zhen Ji 2011, 'Enhanced Cryptography by Multiple Chaotic Dynamics', Mathematical Problems in Engineeringhttp://dx.doi.org/10.1155/2011/938454. Retrieved from DOAJ CC BY 4.0 (https://creativecommons.org/licenses/by-sa/4.0/legalcode)
The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys.
Muhammad Khurram Khan, Khaled Alghathbar, Xianfeng Guo, Jiashu Zhang 2011, 'Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks',Sensorshttp://www.mdpi.com/1424-8220/11/2/1607/. Retrieved from DOAJ CC BY 4.0 (https://creativecommons.org/licenses/by-sa/4.0/legalcode)
The method produces accurate results for both applications, comparable to running standard algorithms on plaintext data.
Charlotte Bonte, Frederik Vercauteren 2018, 'Privacy-preserving logistic regression training', BMC Medical Genomicshttp://link.springer.com/article/10.1186/s12920-018-0398-y. Retrieved from DOAJ CC BY 4.0 (https://creativecommons.org/licenses/by-sa/4.0/legalcode)
Cryptosystems of this type suffer from unsatisfactory encryption speed and are considered insecure upon known/chosen plaintext attacks.
Jun-xin Chen, Zhi-liang Zhu, Li-bo Zhang, Chong Fu, Hai Yu 2014, 'An Efficient Diffusion Scheme for Chaos-Based Digital Image Encryption', Mathematical Problems in Engineeringhttp://dx.doi.org/10.1155/2014/427349. Retrieved from DOAJ CC BY 4.0 (https://creativecommons.org/licenses/by-sa/4.0/legalcode)