encrypt


Also found in: Thesaurus, Medical, Financial, Acronyms, Encyclopedia, Wikipedia.

en·crypt

 (ĕn-krĭpt′)
tr.v. en·crypt·ed, en·crypt·ing, en·crypts
1. To put into code or cipher.
2. Computers To alter (data) using a mathematical algorithm so as to make the data unintelligible to unauthorized users while allowing a user with a key or password to convert the altered data back to its original state.

encrypt

(ɪnˈkrɪpt)
vb (tr)
1. (Communications & Information) to put (a message) into code
2. (Computer Science) to put (computer data) into a coded form
3. (Broadcasting) to distort (a television or other signal) so that it cannot be understood without the appropriate decryption equipment
[C20: from en-1 + crypt, as in crypto-]
enˈcrypted adj
enˈcryption n

en•crypt

(ɛnˈkrɪpt)

v.t.
to encipher or encode.
[1940–45; en-1 + -crypt (extracted from cryptic, cryptography, etc.); on the model of encode]
en•cryp′tion, en`cryp•ta′tion, n.

encrypt


Past participle: encrypted
Gerund: encrypting

Imperative
encrypt
encrypt
Present
I encrypt
you encrypt
he/she/it encrypts
we encrypt
you encrypt
they encrypt
Preterite
I encrypted
you encrypted
he/she/it encrypted
we encrypted
you encrypted
they encrypted
Present Continuous
I am encrypting
you are encrypting
he/she/it is encrypting
we are encrypting
you are encrypting
they are encrypting
Present Perfect
I have encrypted
you have encrypted
he/she/it has encrypted
we have encrypted
you have encrypted
they have encrypted
Past Continuous
I was encrypting
you were encrypting
he/she/it was encrypting
we were encrypting
you were encrypting
they were encrypting
Past Perfect
I had encrypted
you had encrypted
he/she/it had encrypted
we had encrypted
you had encrypted
they had encrypted
Future
I will encrypt
you will encrypt
he/she/it will encrypt
we will encrypt
you will encrypt
they will encrypt
Future Perfect
I will have encrypted
you will have encrypted
he/she/it will have encrypted
we will have encrypted
you will have encrypted
they will have encrypted
Future Continuous
I will be encrypting
you will be encrypting
he/she/it will be encrypting
we will be encrypting
you will be encrypting
they will be encrypting
Present Perfect Continuous
I have been encrypting
you have been encrypting
he/she/it has been encrypting
we have been encrypting
you have been encrypting
they have been encrypting
Future Perfect Continuous
I will have been encrypting
you will have been encrypting
he/she/it will have been encrypting
we will have been encrypting
you will have been encrypting
they will have been encrypting
Past Perfect Continuous
I had been encrypting
you had been encrypting
he/she/it had been encrypting
we had been encrypting
you had been encrypting
they had been encrypting
Conditional
I would encrypt
you would encrypt
he/she/it would encrypt
we would encrypt
you would encrypt
they would encrypt
Past Conditional
I would have encrypted
you would have encrypted
he/she/it would have encrypted
we would have encrypted
you would have encrypted
they would have encrypted
ThesaurusAntonymsRelated WordsSynonymsLegend:
Verb1.encrypt - convert ordinary language into code; "We should encode the message for security reasons"
encode - convert information into code; "encode pictures digitally"
Translations

encrypt

[ɪnˈkrɪpt] VTcodificar

encrypt

[ɪnˈkrɪpt] vt (= encode) [+ data, message] → crypter

encrypt

vt (Comput, Telec, TV) → verschlüsseln
References in periodicals archive ?
3CX, developer of the next-generation software-based Unified Communications Solution, is pleased to announce its cooperation with the security certificate authority Lets Encrypt.
I like to think of the CMK as a means of grouping the CEKs, which specifically define which columns to encrypt, and associating them to a particular application or functionality.
SSL connections encrypt all data sent across the network: the password, the queries, and the data returned.
According to the company, the new release of Encrypted Documents allows organisations to automatically encrypt files and folders on their employees' laptops, computers, network drives and removable media devices if the files meet the requirements of the companies' pre-defined policies.
To ensure that security is maintained for encryption operations, processes must be put into place that allow for complete control and security of the keys used to encrypt and decrypt the data.
SEL encrypted serial port software is included to encrypt serial-port data and send it to a remote SEL-3022, using the PC's standard wireless Ethernet interface.
PGP and S/MIME use the same encryption algorithms to encrypt messages, both use the same signature mechanisms and both use asymmetric encryption mechanisms.
Cards that rely on cryptography for security usually have an additional processor and extra memory to provide a secret environment for handling the calculations necessary to encrypt and decrypt digital information and to provide digital signatures.
If you want to be sure that no one can read your electronic mail except the person you send it to, you should encrypt it.
For complete at-rest data protection, our Siafu Swarm Series complements our Siafu Sypher Series of in-line appliances which securely compress data and encrypt tapes destined for offsite locations," added Matze.
Key Management: The hard part about encrypting data is not how to encrypt it--it's how to manage it.