encrypted


Also found in: Thesaurus, Medical, Financial, Encyclopedia, Wikipedia.
Related to encrypted: requisitioning

en·crypt

 (ĕn-krĭpt′)
tr.v. en·crypt·ed, en·crypt·ing, en·crypts
1. To put into code or cipher.
2. Computers To alter (data) using a mathematical algorithm so as to make the data unintelligible to unauthorized users while allowing a user with a key or password to convert the altered data back to its original state.

Translations

encrypted

[ɪnˈkrɪptɪd] adj [data, message] → crypté(e); [signal] → crypté(e)
References in periodicals archive ?
today announced the development of a technology that can perform concealed searches of encrypted data in its encrypted form.
has reportedly admitted that customers' PIN data was breached during a recent hack attack, but has insisted that the encrypted PIN numbers are safe and secure.
com), a leading provider of email and data encryption for enterprises, announces it has received the CESG Claims Tested Mark (CCTM) Award for Echoworx Encrypted Mail and Encrypted Documents products.
Worldwide Computer Products News-17 June 2009-Echoworx introduces enhanced Encrypted Documents for endpoint encryption(C)1995-2009 M2 COMMUNICATIONS http://www.
CMS Products Inc recently showcased the ABSplus and CE Secure Encrypted Storage product ranges.
CRYPT to the extension of the encrypted files and places a text file named
Administrators should have limited access to this server, and should not delete a log without first archiving it using encryption, authentication, and a digital signature for the encrypted file.
SEL encrypted serial port software is included to encrypt serial-port data and send it to a remote SEL-3022, using the PC's standard wireless Ethernet interface.
com), you can mount an encrypted drive space and store client data inside the mounted hard drive--all without a major financial investment.
11 terrorist attacks on the World Trade Center and the Pentagon, officials suspect that hijackers and planners of the attacks used steganography, a method of hiding encrypted messages within, say, music files or pictures.
A message encrypted with the users public key can only be decrypted with the corresponding private key and vice versa.
Theoretical studies indicate that an intruder could unravel DES' 56-bit secret key by analyzing fewer than 200 faulty encrypted messages and comparing them to a single flawless message.