1. The encrypted text then contains the IV, cipher text , and authentication code. 2. In the following examples, two cipher texts contain the same message. 3. Decryption works by applying the same program in reverse on the cipher text . 4. The fan club's member's handbook included a simple substitution cipher with a resulting numeric cipher text . 5. When he pressed the cipher text letter, the letter in the original plain text message lit up. 6. This provided Bletchley Park with excellent cribs in which both the plain and cipher text were known. 7. A differential fault attack has been published using 7 faulty cipher texts under random 4 bit nibble fault model 8. FROG itself operates as an interpreter that applies this key-dependent program on the plain text to produce the cipher text . 9. All four pages show strange illustrations next to a cipher text which has not yet been deciphered ( as of May 2015 ). 10. When a key was pressed, a light came on behind the cipher text letter, always different from the original letter in the plain text.