decrypt

(redirected from decryptions)
Also found in: Thesaurus, Medical, Encyclopedia.

de·crypt

 (dē-krĭpt′)
tr.v. de·crypt·ed, de·crypt·ing, de·crypts
1. To decipher.
2. To decode.
n. (dē′krĭpt′)
A deciphered or decoded message.

[de- + -crypt (from cryptogram).]

de·cryp′tion n.

decrypt

(diːˈkrɪpt)
vb (tr)
1. (Communications & Information) to decode (a message) with or without previous knowledge of its key
2. (Broadcasting) to make intelligible (a television or other signal) that has been deliberately distorted for transmission
[C20: from de- + crypt, as in cryptic]
deˈcrypted adj
deˈcryption n

de•crypt

(diˈkrɪpt, dɪ-)

v.t.
to decode or decipher.
[1935–40; de- + crypt (ogram)]
de•cryp′tion, n.

decrypt

To convert encrypted text into its equivalent plain text by means of a cryptosystem. (This does not include solution by cryptanalysis.) (Note: The term "decrypt" covers the meanings of "decipher" and "decode.") See also cryptosystem.

decrypt


Past participle: decrypted
Gerund: decrypting

Imperative
decrypt
decrypt
Present
I decrypt
you decrypt
he/she/it decrypts
we decrypt
you decrypt
they decrypt
Preterite
I decrypted
you decrypted
he/she/it decrypted
we decrypted
you decrypted
they decrypted
Present Continuous
I am decrypting
you are decrypting
he/she/it is decrypting
we are decrypting
you are decrypting
they are decrypting
Present Perfect
I have decrypted
you have decrypted
he/she/it has decrypted
we have decrypted
you have decrypted
they have decrypted
Past Continuous
I was decrypting
you were decrypting
he/she/it was decrypting
we were decrypting
you were decrypting
they were decrypting
Past Perfect
I had decrypted
you had decrypted
he/she/it had decrypted
we had decrypted
you had decrypted
they had decrypted
Future
I will decrypt
you will decrypt
he/she/it will decrypt
we will decrypt
you will decrypt
they will decrypt
Future Perfect
I will have decrypted
you will have decrypted
he/she/it will have decrypted
we will have decrypted
you will have decrypted
they will have decrypted
Future Continuous
I will be decrypting
you will be decrypting
he/she/it will be decrypting
we will be decrypting
you will be decrypting
they will be decrypting
Present Perfect Continuous
I have been decrypting
you have been decrypting
he/she/it has been decrypting
we have been decrypting
you have been decrypting
they have been decrypting
Future Perfect Continuous
I will have been decrypting
you will have been decrypting
he/she/it will have been decrypting
we will have been decrypting
you will have been decrypting
they will have been decrypting
Past Perfect Continuous
I had been decrypting
you had been decrypting
he/she/it had been decrypting
we had been decrypting
you had been decrypting
they had been decrypting
Conditional
I would decrypt
you would decrypt
he/she/it would decrypt
we would decrypt
you would decrypt
they would decrypt
Past Conditional
I would have decrypted
you would have decrypted
he/she/it would have decrypted
we would have decrypted
you would have decrypted
they would have decrypted
ThesaurusAntonymsRelated WordsSynonymsLegend:
Verb1.decrypt - convert code into ordinary language
rewrite - write differently; alter the writing of; "The student rewrote his thesis"

decrypt

verb
To find the key to (a code, for example):
Translations

decrypt

vt (Comput, Telec) → entschlüsseln
References in periodicals archive ?
I have already sent decryption keys to many customers who had sent me the correct amounts of bitcoin, and I guarantee the decryptions for such honest customers.
Case 1: one of the decryptions yields a correct name of the next server s'.
If the distance between the malicious nodes on the path is k +1, then in average [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] oracle decryptions are required, where N is the number of honest routers in the network.
1] , after all partial decryptions and inserting random blocks it has the form:
Namely, during the decryption procedure a node needs to perform many trial decryptions in order to find a proper destination key.
5] , with the corresponding context-sensitive decryptions happening along the way.
The last subkey was stored in the case that multiple decryptions occurred with the same key.
For decryption, the ciphertext is the data block to be processed.
Encryption or decryption speed may be traded off against security, indirectly or directly.
In some cases, the speed of key setup is more significant than encryption or decryption speed.
These tables provide information from various contributors on the encryption speed (Tables 16-21), decryption speed (Tables 22-25), and key setup time (Tables 26-30).
Leveraging the RSA Keon software, Forum Sentry provides identity management, hardware accelerated SSL authentication, WS-Security processing, SAML processing, hardware accelerated XML Digital Signatures, XML Digital Signature Verifications, XML Encryptions and XML Decryptions.