Find the word definition

Crossword clues for encryption

The Collaborative International Dictionary
encryption

encryption \encryption\ n. the process of converting messages in ordinary language, or other information into a secret coded form that cannot be interpreted without knowing the secret method for interpretation, called the key.

Note: Encryption is used commonly to allow messages to be transmitted between parties at a distance without permitting others to read and understand the message. It is also used to make data more secure from possible discovery and uninterpretable by unauthorized people accessing the data. In order to read an encrypted message, a party normally requires knowledge of both the method of encryption and the secret key, which may be a single word or more complex sequence of characters. Until recently, transmission of such secret messages required that the key be transmitted secretly by some seecure and reliable method to the party receiving the message. More recently, a mathematical method was discovered to allow a party to publish an encoding key (the public key) which allows anyone to encode a message, but the message thus encoded can only be decoded by the person possessing a corresponding key, called the private key. This two-key system is called the public-key encryption method.

Syn: encoding, coding, enciphering, ciphering, cyphering, writing in code.

Wiktionary
encryption

n. (context cryptography English) The process of obscuring information to make it unreadable without special knowledge, key files, and/or passwords. May also apply to electronic signal, hard drive, message, document...

WordNet
encryption

n. the activity of converting from plain text into code [syn: encoding]

Wikipedia
Encryption

In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skill are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Encryption (album)

Encryption is an album by the band Pro-jekt. It was released in 2002 by Nightbreed Records.

Usage examples of "encryption".

The encryption system is based on the nonrational mathematics which obtain within the interior of a black-hole event horizon.

Makes you overdependent on encryption, for one thing, and on the goodwill of the server owners, for another.

SATCOM radio, the KY-57 encryption device, the folding umbrellalike antenna, and one of the several bio sample kits.

Encryption algorithms were just mathematical formulas, recipes for scrambling text into code.

No commercial manufacturer had ever dreamed of creating an encryption chip because normal encryption algorithms eventually become obsolete.

Encryption algorithms werejust mathematical formulas, recipes for scrambling text into code.

Because brute-force computers broke codes by examining cleartext for identifiable word patterns, Harne proposed an encryption algorithm that, in addition to encrypting, shifted decrypted cleartext over a time variant.

Information Systems Security, the encryption within the STE is so powerful that, given projected foreign codebreaking capabilities, it will remain fully secure for at least fifty years.

He took their ultrasophisticated digital encryption algorithms, with complementary hardware and software, to the master communicators at the Pentagon, the Defense Communications Agency, the National Security Agency, and the White House Communications Agency.

And, as Komulakov had planned, the GPS transponder in the little encryption device provided the exact location of the QRF every time Coombs communicated.

Soviet Union created a need for exotic languages, the proliferation of low-cost, complex encryption systems and fast computers has forced NSA to search for more mathematicians whom they can convert to codebreakers.

The technicians began to unload the equipment and carry the components into the suite: computer terminals, a secure fax machine, encryption equipment, secure phones, and radio repeaters.

Not for the first time, Lissa wished quantum encryption had been made to work for transluminal communication.

His weaponry included the famous SATAN program (the Security Administer Tool for Analyzing Networks, used by both sysadmins and hackers to check the "hackability" of computer networks), several breaking and entering programs that would let him grab root access on various types of machines and networks, a custom-made Web browser and newsreader, a cloaking program to hide his presence while he was in someone else's computer and which would delete traces of his activities when he logged off, sniffer programs that would "sniff out" - find - user-names, passwords and other helpful information on the Net or in someone's computer, a communications program to send that data back to him, encryption programs and lists of hacker Web sites and anonymizer sites (commercial services that would in effect "launder" e-mails and messages so that the recipient couldn't trace Gillette).

His weaponry included the famous SATAN program (the Security Administer Tool for Analyzing Networks, used by both sysadmins and hackers to check the “hackability” of computer networks), several breaking and entering programs that would let him grab root access on various types of machines and networks, a custom-made Web browser and newsreader, a cloaking program to hide his presence while he was in someone else’s computer and which would delete traces of his activities when he logged off, sniffer programs that would “sniff out” – find – user-names, passwords and other helpful information on the Net or in someone’s computer, a communications program to send that data back to him, encryption programs and lists of hacker Web sites and anonymizer sites (commercial services that would in effect “launder” e-mails and messages so that the recipient couldn’t trace Gillette).