Search for crossword answers and clues

Answer for the clue "Convert to code ", 7 letters:
encrypt

Alternative clues for the word encrypt

Word definitions for encrypt in dictionaries

Douglas Harper's Etymology Dictionary Word definitions in Douglas Harper's Etymology Dictionary
1968 in telecommunications, a back-formation from encryption (1964), or from en- (1) + crypt (n.) on the notion of "hidden place" (see crypto- ). Related: Encrypted ; encrypting .

The Collaborative International Dictionary Word definitions in The Collaborative International Dictionary
encrypt \encrypt\ v. t. to convert ordinary language into code; to hide the meaning of a message by converting it into a form that cannot be interpreted without knowing the secret method for interpretation, called the key. Syn: encode, code, encipher, cipher, ...

WordNet Word definitions in WordNet
v. convert ordinary language into code; "We should encode the message for security reasons" [syn: encode , code , encipher , cipher , cypher , inscribe , write in code ] [ant: decode ]

Longman Dictionary of Contemporary English Word definitions in Longman Dictionary of Contemporary English
verb EXAMPLES FROM CORPUS ▪ Do you need to encrypt - if so, how? ▪ Its other function is to take over your hard disc and encrypt all the file directories, rendering the disc unusable. ▪ The private key, used to encrypt transmitted information by the user, ...

Usage examples of encrypt.

This requires regular test decryption of a random sampling of encrypted files to make sure the data can be recovered.

If the Posleen were using detection equipment at all, the encrypted microbursts would appear as nothing more than the sort of subspace anomalies usually found on planetary surfaces.

His desk looked like a command console, equipped with a standard multiline telephone, a STU-III encrypted telephone, and the preaddressed telephone system that networked all the other executive assistants on both the Navy headquarters staff and also in the office of the Chairman of the Joint Chiefs of Staff, who happened to be a navy admiral.

Now, Cube, all that stands between us and the Phonetix blueprints is an encrypted computer.

From her private transport, encrypted signals were broadcast through the high, camouflaged outer wall of the urb, through the gated fence that surrounded her personal property, and into her garage.

Because brute-force computers broke codes by examining cleartext for identifiable word patterns, Harne proposed an encryption algorithm that, in addition to encrypting, shifted decrypted cleartext over a time variant.

Because brute-force computers broke codes by examiningcleartext for identifiable word patterns, Harne proposed anencryption algorithm that, in addition to encrypting, shifteddecrypted cleartext over a time variant.

A key to codebreaking is the ability to quickly test encrypted text against every conceivable combination of letters in an alphabet.

Then, like magic, high-level encrypted Russian communications, pulled from the ether, began spewing forth in readable plaintext.

As instructed by the Russian general in New York, Coombs kept in communication with his UN superior via sat comms encrypted with an EL-3.

Unlike Enigma, the Fish were capable of automatically encrypting at one end and decrypting at the other.

He encrypts his letters, but they know how to crack that one, and we can read most of his e-mails.

They were three hours away from the heliopause when Helm announced receipt of an encrypted message from Admiral Gollanch.

Through traffic analysis of pre-strike encrypted transmissions, they were able to identify alerts from the indicators that marked Flash messages.

All other relevant documents were in their laptops, fully encrypted, along with modems and communications software, also fully encrypted.