Lines Matching full:plaintext
322 same size as the plaintext for the Section 4 pre-defined transforms.
327 of the plaintext or MAY be larger. Figure 1 shows the RTP payload
1080 same way, but swapping the roles of the plaintext and ciphertext.
1379 encryption SHALL simply copy the plaintext input into the ciphertext
2121 knowledge about the plaintext source to enable key collision and
2185 Key derivation limits the amount of plaintext that is encrypted with
2240 it is important to use a cipher designed to resist known plaintext
2309 an adversary to acquire the RTP plaintext data, since for many
2313 the plaintext. For example, a hidden snooping device might be
2318 by the victim. Plaintext prediction may also be especially difficult
2358 An attacker who cannot predict the plaintext is still always able to
2360 it decrypts to a random plaintext value, or to send a stream of bogus
2361 packets to the receiver that will decrypt to random plaintext values.
2370 An attacker who cannot predict the plaintext can still replay a
2376 An attacker who can predict the plaintext can modify the ciphertext
2383 made on decrypted but unauthenticated plaintext. This is because the
2387 plaintext; information in the plaintext will determine to what subnet
2388 (or process) the plaintext is forwarded in ESP [RFC2401] tunnel mode
2403 the decrypted plaintext.
2420 random plaintext values. While this protection is not equivalent to
2771 Redundant Plaintext and Implications on Internet Security",
2919 plaintext : 70736575646f72616e646f6d6e657373
2927 plaintext : 20697320746865206e65787420626573
2935 plaintext : 74207468696e67