encrypt


Also found in: Thesaurus, Medical, Financial, Acronyms, Encyclopedia.

en·crypt

 (ĕn-krĭpt′)
tr.v. en·crypt·ed, en·crypt·ing, en·crypts
1. To put into code or cipher.
2. Computers To alter (data) using a mathematical algorithm so as to make the data unintelligible to unauthorized users while allowing a user with a key or password to convert the altered data back to its original state.

encrypt

(ɪnˈkrɪpt)
vb (tr)
1. (Communications & Information) to put (a message) into code
2. (Computer Science) to put (computer data) into a coded form
3. (Broadcasting) to distort (a television or other signal) so that it cannot be understood without the appropriate decryption equipment
[C20: from en-1 + crypt, as in crypto-]
enˈcrypted adj
enˈcryption n

en•crypt

(ɛnˈkrɪpt)

v.t.
to encipher or encode.
[1940–45; en-1 + -crypt (extracted from cryptic, cryptography, etc.); on the model of encode]
en•cryp′tion, en`cryp•ta′tion, n.

encrypt


Past participle: encrypted
Gerund: encrypting

Imperative
encrypt
encrypt
Present
I encrypt
you encrypt
he/she/it encrypts
we encrypt
you encrypt
they encrypt
Preterite
I encrypted
you encrypted
he/she/it encrypted
we encrypted
you encrypted
they encrypted
Present Continuous
I am encrypting
you are encrypting
he/she/it is encrypting
we are encrypting
you are encrypting
they are encrypting
Present Perfect
I have encrypted
you have encrypted
he/she/it has encrypted
we have encrypted
you have encrypted
they have encrypted
Past Continuous
I was encrypting
you were encrypting
he/she/it was encrypting
we were encrypting
you were encrypting
they were encrypting
Past Perfect
I had encrypted
you had encrypted
he/she/it had encrypted
we had encrypted
you had encrypted
they had encrypted
Future
I will encrypt
you will encrypt
he/she/it will encrypt
we will encrypt
you will encrypt
they will encrypt
Future Perfect
I will have encrypted
you will have encrypted
he/she/it will have encrypted
we will have encrypted
you will have encrypted
they will have encrypted
Future Continuous
I will be encrypting
you will be encrypting
he/she/it will be encrypting
we will be encrypting
you will be encrypting
they will be encrypting
Present Perfect Continuous
I have been encrypting
you have been encrypting
he/she/it has been encrypting
we have been encrypting
you have been encrypting
they have been encrypting
Future Perfect Continuous
I will have been encrypting
you will have been encrypting
he/she/it will have been encrypting
we will have been encrypting
you will have been encrypting
they will have been encrypting
Past Perfect Continuous
I had been encrypting
you had been encrypting
he/she/it had been encrypting
we had been encrypting
you had been encrypting
they had been encrypting
Conditional
I would encrypt
you would encrypt
he/she/it would encrypt
we would encrypt
you would encrypt
they would encrypt
Past Conditional
I would have encrypted
you would have encrypted
he/she/it would have encrypted
we would have encrypted
you would have encrypted
they would have encrypted
ThesaurusAntonymsRelated WordsSynonymsLegend:
Verb1.encrypt - convert ordinary language into code; "We should encode the message for security reasons"
encode - convert information into code; "encode pictures digitally"
Translations

encrypt

[ɪnˈkrɪpt] VTcodificar

encrypt

[ɪnˈkrɪpt] vt (= encode) [+ data, message] → crypter

encrypt

vt (Comput, Telec, TV) → verschlüsseln
References in periodicals archive ?
The solution already enables employees to encrypt files at their option but the new version helps companies mitigate the risk of liability for employees who forget to encrypt and protect sensitive data.
a unique key generated for each tape) provide greater security than a single key generated to encrypt data on all tapes in the enterprise.
Last but not least: Users have willingly to encrypt messages.
One key, which is openly available, is used to encrypt information; the other key, known only to the intended recipient (or encoded in the smart card), is used to decipher the message.
They described a radically new kind of code in which the key used to encrypt a message would be different from the key used to decrypt it.
Encrypt by Folder -- For example, encrypt all files in users' 'My Documents' folders.
After the data is formatted by the backup software, a network encryption appliance can encrypt data before it's sent to the library.
There's no need to keep the second key secret because, in principle, there should be no way to figure out the private-key from knowledge of the public key Thus, everyone has a private key and a public key, which they can then use to encrypt or decrypt messages.