The results of an encryption operation performed using an encryption algorithm, encryption key(s) and specific data. It is often used to exchange code messages, and allows two parties to communicate in a confidential manner without a third party being able to interfere with the data and/or instructions being exchanged.