Proton
what is ciphertext

Ciphertext is unreadable, encrypted data that can only be read if you know the key. Learn all about ciphertext and how it ensures your data privacy by securing computers and online communications, including encrypted email.

When Julius Caesar wanted to send a secret message to the Roman army, he scrambled the letters into ciphertext – garbled text that could only be deciphered with a secret key. Only the troops that knew the key could read it.

Two thousand years later, computer-generated ciphertext keeps your confidential data private on your devices and online. We explain what ciphertext is and how it’s used to secure online communications, including encrypted email.

What are ciphertext and plaintext?
Ciphertext example
Types of ciphers
Asymmetric-key ciphers
Symmetric-key ciphers
Uses of ciphertext
Email ciphertext

Get Proton Mail button

What are ciphertext and plaintext?

In cryptography, ciphertext, also known as encrypted text, is the unreadable text that results when you encrypt text.

In contrast, plaintext is ordinary, readable text that is not encrypted.

When you encrypt a message using an encryption algorithm known as a cipher, your original text (plaintext) is transformed into a series of random numbers and letters (ciphertext) that can’t be read.

When you decrypt the message, this ciphertext is converted back into plaintext — your original, readable message.

Ciphertext example

Here is some simple ciphertext encrypted using the Caesar cipher, Julius Caesar’s original method, which uses letters only:

JV PBZOBQ QBUQ

To encrypt the original message into the ciphertext above, each letter of the text was shifted three letters back in the alphabet.

  • “A” shifts three letters back and becomes “X”
  • “B” becomes “Y”
  • “C” becomes “Z”
  • and so on…

Example of Caesar cipher: ciphertext is created by shifting the letters of the message back 3 letters in the alphabet

So to decrypt the message into readable plaintext, you must shift each letter three letters forward in the alphabet.

CiphertextJVPBZOBQQBUQ
Plaintext (3 letters forward)MYSECRETTEXT
Deciphering ciphertext into plaintext

So “JV PBZOBQ QBUQ” reads “MY SECRET TEXT”.

In this case, the key to the cipher is 3: you shift each letter three places back or forward in the alphabet to encrypt or decrypt it. This is known as a substitution cipher.

Types of ciphers

Historically, encryption was done by hand, typically using pen and paper. Before the advent of machines, ciphertext was usually created by simply replacing letters (substitution cipher) or re-ordering them (transposition cipher).

These simple ciphers are no longer used as methods of encryption on their own because they’re quite easy to decipher. Today, computer-implemented ciphers are much more secure with long, complex keys consisting of numbers and letters. The longer the key, the harder the cipher is to crack.

Modern ciphers can be divided into two broad categories depending on how they handle keys:

1. Asymmetric-key ciphers

Also known as public-key ciphers, asymmetric-key ciphers use pairs of mathematically related keys: a public key and a private key

You encrypt a message to create ciphertext with a person’s public key, which is publicly available and anyone can use. But only that person can decrypt the message into plaintext using their corresponding private key, which they keep secret.

2. Symmetric-key ciphers

Also known as private-key ciphers, symmetric-key ciphers use a single key to encrypt and decrypt the message.

Key typeKey(s)Examples
Asymmetric-key cipherPublic key
Private key
RSA, ECC
Symmetric-key cipherSingle keyAES, ChaCha20, Salsa20
Types of ciphers

Uses of ciphertext

From your smartphone and laptop to websites, secure email, cloud storage, and ATMs, ciphertext is used wherever encryption is used to protect the confidentiality of data on computers and computer networks. 

For example, most websites use HTTPS(new window) to secure communications, which relies on the TLS encryption protocol. Connect to your bank or an online store, and TLS converts the data you exchange into ciphertext. TLS uses a combination of asymmetric-key and symmetric-key ciphers to secure your connection.

If you connect to the internet using a virtual private network (VPN)(new window), like Proton VPN(new window), your internet traffic is transformed into ciphertext using symmetric-key encryption. Proton VPN uses strong AES-256(new window) or ChaCha20 ciphers.

Secure email providers, like Proton Mail, also use encryption to scramble your messages into ciphertext. For Proton Mail, we use AES-256 and ECC or RSA ciphers to implement end-to-end encryption, so only you can read your emails.

But with most other email providers that claim to be secure, you can’t guarantee your messages will remain encrypted all the time.

Email ciphertext

Most big email services, like Gmail and Outlook, encrypt emails in two ways. They use:

  • TLS encryption to secure emails in transit, turning them into ciphertext when they’re being sent from A to B (if the recipient’s server supports TLS)
  • Symmetric-key encryption, like AES, to encrypt emails stored on their servers

However, who can decrypt your emails remains beyond your control.

First, TLS secures your messages in transit, but once they arrive, their security depends on what encryption the receiving server uses. As Microsoft explains about Outlook(new window), “with TLS, the message might not stay encrypted after the message reaches the recipient’s email provider”.

Second, most email providers retain the encryption keys to your messages. So they can access your data and hand it over to third parties, like advertisers, data brokers, or governments.

The only way to be sure an email you send will remain as ciphertext until your recipient opens it is to use end-to-end encrypted email, like Proton Mail. With end-to-end encryption, your emails are encrypted on your device before being uploaded to our servers and can only be decrypted and read by the intended recipient. 

For example, when Bob writes to Alice, his message is converted into ciphertext using Alice’s public key. Only Alice can decrypt the message into plaintext by using her private key.

Showing how Bob encrypts his message into ciphertext with Alice's public key; only Alice can decipher it with her private key

We’ve designed Proton Mail so that you remain in control of your encryption keys at all times, so only you can access your emails. With Proton Mail you get:

  • End-to-end encryption: Any message you send to someone on Proton Mail is end-to-end encrypted by default. No one but you and your intended recipient(s) can read them.
  • Password-protected Emails: Easily send an end-to-end encrypted email to anyone who isn’t on Proton Mail without any technical knowledge.
  • Zero-access encryption: No one can access any of your stored emails without your authorization, not even Proton. 

At Proton, our goal is to keep everyone private and secure online, so join us. With Proton Mail, you decide who can decipher your encrypted emails, attachments, contacts, and calendar.

Related articles

The cover image for a Proton blog, showing a phone screen with a lock logo and three password fields surrounding the phone
Here's what to look for when choosing an enterprise password manager to streamline collaboration and protect your organization's sensitive data.
  • Privacy guides
Learn how to unsend an email, how it’s useful for personal or business emails, and how Proton Mail can help.
Proton Mail and Proton Calendar winter product roadmap
  • Product updates
  • Proton Calendar
  • Proton Mail
Preview upcoming updates to Proton Mail and Proton Calendar, including performance boosts, new features, and enhanced privacy tools.
Gantt chart displaying Proton Drive plans and development of new features
Discover the tools, features, and improvements coming to Proton Drive’s secure cloud storage and document editor this winter and spring.
laptop showing Bitcoin price climbing
  • Privacy guides
Learn what a Bitcoin wallet does and the strengths and weaknesses of custodial, self-custodial, hardware, and paper wallets.
pixel tracking: here's how to tell which emails track your activity
Discover what pixel tracking is and how it works, how to spot emails that track you, and how to block these hidden trackers.