encrypt


Also found in: Thesaurus, Medical, Financial, Acronyms, Encyclopedia, Wikipedia.

en·crypt

 (ĕn-krĭpt′)
tr.v. en·crypt·ed, en·crypt·ing, en·crypts
1. To put into code or cipher.
2. Computers To alter (data) using a mathematical algorithm so as to make the data unintelligible to unauthorized users while allowing a user with a key or password to convert the altered data back to its original state.

encrypt

(ɪnˈkrɪpt)
vb (tr)
1. (Communications & Information) to put (a message) into code
2. (Computer Science) to put (computer data) into a coded form
3. (Broadcasting) to distort (a television or other signal) so that it cannot be understood without the appropriate decryption equipment
[C20: from en-1 + crypt, as in crypto-]
enˈcrypted adj
enˈcryption n

en•crypt

(ɛnˈkrɪpt)

v.t.
to encipher or encode.
[1940–45; en-1 + -crypt (extracted from cryptic, cryptography, etc.); on the model of encode]
en•cryp′tion, en`cryp•ta′tion, n.

encrypt


Past participle: encrypted
Gerund: encrypting

Imperative
encrypt
encrypt
Present
I encrypt
you encrypt
he/she/it encrypts
we encrypt
you encrypt
they encrypt
Preterite
I encrypted
you encrypted
he/she/it encrypted
we encrypted
you encrypted
they encrypted
Present Continuous
I am encrypting
you are encrypting
he/she/it is encrypting
we are encrypting
you are encrypting
they are encrypting
Present Perfect
I have encrypted
you have encrypted
he/she/it has encrypted
we have encrypted
you have encrypted
they have encrypted
Past Continuous
I was encrypting
you were encrypting
he/she/it was encrypting
we were encrypting
you were encrypting
they were encrypting
Past Perfect
I had encrypted
you had encrypted
he/she/it had encrypted
we had encrypted
you had encrypted
they had encrypted
Future
I will encrypt
you will encrypt
he/she/it will encrypt
we will encrypt
you will encrypt
they will encrypt
Future Perfect
I will have encrypted
you will have encrypted
he/she/it will have encrypted
we will have encrypted
you will have encrypted
they will have encrypted
Future Continuous
I will be encrypting
you will be encrypting
he/she/it will be encrypting
we will be encrypting
you will be encrypting
they will be encrypting
Present Perfect Continuous
I have been encrypting
you have been encrypting
he/she/it has been encrypting
we have been encrypting
you have been encrypting
they have been encrypting
Future Perfect Continuous
I will have been encrypting
you will have been encrypting
he/she/it will have been encrypting
we will have been encrypting
you will have been encrypting
they will have been encrypting
Past Perfect Continuous
I had been encrypting
you had been encrypting
he/she/it had been encrypting
we had been encrypting
you had been encrypting
they had been encrypting
Conditional
I would encrypt
you would encrypt
he/she/it would encrypt
we would encrypt
you would encrypt
they would encrypt
Past Conditional
I would have encrypted
you would have encrypted
he/she/it would have encrypted
we would have encrypted
you would have encrypted
they would have encrypted
ThesaurusAntonymsRelated WordsSynonymsLegend:
Verb1.encrypt - convert ordinary language into code; "We should encode the message for security reasons"
encode - convert information into code; "encode pictures digitally"
Translations

encrypt

[ɪnˈkrɪpt] VTcodificar

encrypt

[ɪnˈkrɪpt] vt (= encode) [+ data, message] → crypter

encrypt

vt (Comput, Telec, TV) → verschlüsseln
References in periodicals archive ?
Lieu (D-Los Angeles County), speaking at DEFCON, announced the reintroduction of the Ensuring National Constitutional Rights for Your Private Telecommunications (ENCRYPT) Act.
For speech encryption, most of the methods used to encrypt digital speeches are permutation [8-13].
It's a standard security practice for companies to encrypt passwords to store on its internal servers.
In order to enhance the security, a stream cipher is used to encrypt the message according to the data-hiding key [Dh.sub.key].
For example, in Word, while the document is open, go to File > Info, expand the Protect Document menu, and select Encrypt with Password.
Once installed, you can use the gear menu > S/MIME settings to encrypt all messages.
Hence it is therefore necessary to encrypt the sensitive data before outsourcing them to the cloud server.
The nonprofit Internet Security Research Group hopes to encrypt all internet websites with a program called Let's Encrypt.
According to the research, organizations encrypt to protect their proprietary company data.
Cypherix 11 can encrypt any kind of data on any medium.
For example, 31 percent of the companies surveyed that store this type of data admit that employee bank details are not always encrypted. Forty-three percent of the companies holding sensitive employee HR files don't always encrypt them, and nearly half of those that store employee healthcare information (47 percent) fail to consistently encrypt these records.
The most commonly reported PII breach in the Department of the Navy is also one of the easiest breaches to prevent: failure to encrypt an email message containing personally identifiable information (PII).