answersLogoWhite

0


Best Answer

Before encryption, the data is referred to as "plain text". After encryption it is called "cipher text".

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the data called when it is to be encrypted by inputting into an algorithm called?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is inputting data?

Data that you put in


Is there a way algorithm to encrypt more numbers in one number and can decrypt?

Yes, there are several algorithms for data compression, that is, store data in less space than it usually needs. However, not all data can be encrypted. Encryption basically takes advantage of some sort of repetition in data; once all repetition has been eliminated, data can be encrypted no more.Yes, there are several algorithms for data compression, that is, store data in less space than it usually needs. However, not all data can be encrypted. Encryption basically takes advantage of some sort of repetition in data; once all repetition has been eliminated, data can be encrypted no more.Yes, there are several algorithms for data compression, that is, store data in less space than it usually needs. However, not all data can be encrypted. Encryption basically takes advantage of some sort of repetition in data; once all repetition has been eliminated, data can be encrypted no more.Yes, there are several algorithms for data compression, that is, store data in less space than it usually needs. However, not all data can be encrypted. Encryption basically takes advantage of some sort of repetition in data; once all repetition has been eliminated, data can be encrypted no more.


Sensitive data on a GFE mobile device does not need to be encrypted?

Sensitive data on a GFE mobile device does not need to be encrypted


What is a characteristic of public key cryptography?

If data is encrypted with the public key, only the private key can decrypt itAnswer Explanation: Public key encryption uses an asymmetric algorithm, which uses a public key and private key combination for the encryption and decryption process. If data is encrypted with the public key, only the private key can decrypt the data. The public key cannot decrypt a message that was encrypted with the public key. Alternatively, if data is encrypted with the private key, only the public key can decrypt the data.


Which tyoe of printer would be most useful for printing multipart insurance. clclaim forms?

Encrypted. Data are called what


What is the process of converting data from encrypted format back to its original format?

Decryption is the process of converting data from an encrypted format back to its original state.


What is The system of algorithm parameters keys andor passwords used for encrypting and decrypting data is called what?

A


What is compaction in data structure?

The process of moving all marked nodes to one end of memory and all available memory to other end is called compaction. Algorithm which performs compaction is called compacting algorithm.


What Unix control sequence will tell the application that you have finished inputting data?

D


What is input device keys used to enter data?

A computer's keyboard.


What is meant by the term algorithm?

Algorithm means written expression of any data.


What is classified data that is sent to an unclassified network called?

The classified data, sent over an unclassified network, must be securely encrypted.