| 1. | The encrypted text then contains the IV, cipher text, and authentication code.
|
| 2. | In the following examples, two cipher texts contain the same message.
|
| 3. | Decryption works by applying the same program in reverse on the cipher text.
|
| 4. | The fan club's member's handbook included a simple substitution cipher with a resulting numeric cipher text.
|
| 5. | When he pressed the cipher text letter, the letter in the original plain text message lit up.
|
| 6. | This provided Bletchley Park with excellent cribs in which both the plain and cipher text were known.
|
| 7. | A differential fault attack has been published using 7 faulty cipher texts under random 4 bit nibble fault model
|
| 8. | FROG itself operates as an interpreter that applies this key-dependent program on the plain text to produce the cipher text.
|
| 9. | All four pages show strange illustrations next to a cipher text which has not yet been deciphered ( as of May 2015 ).
|
| 10. | When a key was pressed, a light came on behind the cipher text letter, always different from the original letter in the plain text.
|