The process of disguising ordinary text or plaintext is called encryption, and encrypted data is called ciphertext. |
The ciphertext produced by a weak encryption algorithm looks as good as ciphertext produced by a strong encryption algorithm. |
Authenticity of the ciphertext can be established by decrypting it with your public key. |
The symmetric encryption key is then encrypted with the public RSA key, and the resulting ciphertext is stored as metadata for the file. |
This is called ciphertext and requires a ciphertext decoder to uncode it and return it back to a readable format. |
The same would be true if digraph or trigraph frequencies were plotted for a sufficiently long ciphertext. |