İngilizce - Türkçe çeviri
 
Tenses: encrypting, encrypted

Related:
encrypt for transmis..
encrypt message
to encrypt
 
Etymology: [ in-'kript, en- ] (transitive verb.) 1944. en- + crypt-.
Antonyms: decrypt
1 kriptolamak  Askeri
2 sifrele
3 KRİPTOLAMAK:Kripto sistemi ile açık bir metni kapatarak anlaşılmaz şekle koymak. (Not: Kriptolamak terimi, şifrelemek ve kodlamak anlamlarını da kapsar). Ayrıca bakınız: "cryptosystem"  Askeri
4 şifrele
5encrypts şifreler
6encrypted şifreli  Bilgisayar
7encrypted şifrelendi  Bilgisayar
8encrypted şifrelenmiş  Bilgisayar
9encrypting şifreleniyor  Bilgisayar
10encrypting şifreleme  Bilgisayar
11encryption kriptolama  Askeri
12encryption İnternet Üzerinde Transfer edilen Bilgilerin Üçüncü şahıslar tarafından okunmasını engellemek amacıyla şifrelenmesi
More results
13 To conceal information by means of a code or cipher
14 To encode data for secure transfer over the Internet
15 Using an algorithm to transform data to conceal its meaning or value
16 To convert plain text into unintelligible form by means of a cryptosystem This cryptosystem can be manual or electronic
17 To translate data into code that cannot be read without presenting the proper password
18 To encipher or encode
19 To make temporarily unreadable Datasets can be encrypted to ensure privacy See the A3C Connection article on encryption at: http://www uic edu/depts/accc/newsletter/adn16/encrypt html
20 To convert data (such as plaintext) into a format that is no longer readable without a password
21 To convert plain text into unintelligible forms by means of a cipher system (crypto system) Encryption (and decryption) can be implemented in software on computers or in hardware - the set of mathematical logic that actually converts (encrypts/decrypts) data
22 To encode data so that only someone with a key can read it
23 To convert plain text into a different form in order to conceal its meaning
24 To change a message into the unreadable form that can be openly transmitted
25 To scramble data or to convert data to a secret code that masks the meaning of the data to any unauthorized recipient
26 Encoding something so others can not read it without having a key to unlock the information
27 To make computer (or other) data unreadable in an orderly fashion, so it can be decrypted later and easily read Related terms: Data
28 encode, convert a message into code (especially secret)  fiil
29 transform clear-text into cipher-text
30 convert ordinary language into code; "We should encode the message for security reasons"
31 To programmatically disguise content to hide its substance Encrypted content, often called a cipher, cannot be played without reversing its format into clear content through the process of decryption
32 encryption is the use of a mathematical based method of "scrambling" the data before it is sent over the data network so that it becomes unreadable except by authorized users The current de-facto standard for encryption for web based traffic is SSL (Secure Sockets Layer)
33 encrypted encryption to write a message in such a way that others cannot read it without having the proper decryption method; to encypher
34 A way to protect data by encoding it so that it appears as a random sequence of characters
35 To render permanently cryptic
36 To make computer (or other) data unreadable in an orderly fashion, so it can be decrypted later and easily read
37 To scramble the contents of a file or message in such a way as to make it unreadable to everyone except those with a software 'key', which makes it possible to unscramble the encrypted file or message Currently the length of encryption keys can range up to around 2048-bits See also: cryptography
38 If a document or piece of information is encrypted, it is written in a special code, so that only certain people can read it. Account details are encrypted to protect privacy. a program that will encrypt the information before sending. encrypted signals. + encryption en·cryp·tion It is currently illegal to export this encryption technology from the US. to protect information by putting it into a special code that only some people can read, especially information that is on a computer decrypt (en- + crypt- (as in cryptogram))
39encrypted Simple past tense and past participle of encrypt
40encrypted Describing something that is in code - "The encrypted text was unreadable."
41encryption The process of obscuring information to make it unreadable without special knowledge, key files, and/or passwords
42ENCRYPTION A means of making data unreadable to everyone except the receiver Encryption is often used to make the transmission of credit card numbers secure for those who are shopping using the Internet
43ENCRYPTION A method of scrambling or encoding data to prevent unauthorized users from reading or tampering with the data Only individuals with access to a password or key can decrypt and use the data The data can include messages, files, folders, or disks
44ENCRYPTION Encryption is the process of changing data into a form that can be read only by the intended receiver To decipher the message, the receiver of the encrypted data must have the proper decryption key In traditional encryption schemes, the sender and the receiver use the same key to encrypt and decrypt data Public-key encryption schemes use two keys: a public key, which anyone may use, and a corresponding private key, which is possessed only by the person who created it With this method, anyone may send a message encrypted with the owner's public key, but only the owner has the private key necessary to decrypt it PGP (Pretty Good Privacy) and DES (data encryption standard) are two of the most popular public-key encryption schemes For more information go to http://security tao ca/crypt_basics html
45ENCRYPTION A means of scrambling data so that the receiver only can read it Encryption is generally used to guarantee the security of credit card transactions online Back to Top
46ENCRYPTION Translating data or documents into a code that cannot be read without a "key " Encryption is the best way to ensure that e-mail is not intercepted and tampered with between the time it is sent and the time it is received, but the technology is not yet user friendly enough to warrant everyday use Encryption also does not offer any protection once the document has been decrypted by the recipient, since it can be altered at that point PGP is currently the most commonly-used encryption software Back to top
47ENCRYPTION Encryption is the transformation of data into a form unreadable by anyone without a secret decryption key Its purpose is to ensure privacy by keeping the information hidden from anyone for whom it was not intended, including those who can see the encrypted data Encryption may be used to make stored data private (e g , data that is stored on a potentially vulnerable hard disk), or to allow a nonsecure communications channel to serve as a private communications channel Encryption is sometimes described as the process of converting plain text into cipher text
48ENCRYPTION Encryption is the process of converting readable data into unreadable characters to prevent unauthorized access To read encrypted data, the data must decrypted; the only parties capable of viewing encrypted data are the sender and the receiver
49ENCRYPTION A way of coding the information in a file or e-mail message so that if it is intercepted by a third party as it travels over a network it cannot be read Only the person or persons that have the right type of decoding software can unscramble the message See also Cryptography
50ENCRYPTION The conversion of data into a form, called ciphertext, that cannot be easily understood by unauthorized people The complementary process, decryption, converts encrypted data back into its original form
51ENCRYPTION Prevents any non-authorized party from reading or changing data The level of protection provided by encryption is determined by an encryption algorithm In a brute-force attack, the strength is measured by the number of possible keys and the key size For example, a Triple-Data Encryption Standard system (3 DES) uses 112-bit or 168-bit keys and, based on currently available processing power, is virtually immune to brute-force attacks Business to Business VPNs (Extranets) share sensitive data with multiple organizations, so demand the highest level of security This requires public key encryption and/or secure key exchange, both of which are designed to eliminate the risk of the key becoming known to an unauthorized party
52ENCRYPTION In order to provide data security, data transmission is often encrypted or scrambled by the sender The receiver has the key to the encryption system, and thus is the only one who can read the information
53ENCRYPTION The translation of data into a secret code Encryption is the most effective way to achieve data security To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it Unencrypted data is called plain text; encrypted data is referred to as cipher text There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption
54ENCRYPTION A way of coding information in a file or e-mail message so that if it is intercepted by a third party as it travels over a network it cannot be read [San Diego State University]
55ENCRYPTION The process of encoding information in an attempt to make it secure from unauthorized access The reverse of this process is known as decryption
56ENCRYPTION Encryption is a complex coding scheme to prevent eavesdroppers from reading information they are not entitled to read
57ENCRYPTION The transformation of plaintext into an apparently less readable form (called ciphertext) through a mathematical process The ciphertext may be read by anyone who has the key that decrypts (undoes the encryption) the ciphertext
58ENCRYPTION Encryption is the conversion of data, using a mathematical algorithm, into a form that cannot be read by unauthorised users Authorised users must be provided with a decryption key in order to unscramble the information There are different strengths of data encryption, determined by the length (in bits) of the key used In general, the longer the key, the stronger the encryption, the more secure the data
59ENCRYPTION The process of transforming plaintext data into an unintelligible form (ciphertext) such that the original data either cannot be recovered (one-way encryption) or cannot be recovered without using an inverse decryption process (two-way encryption)
60ENCRYPTION The process of converting data into "unreadable code" is so that prying eyes cannot understand the content Encryption is necessary as valuable and sensitive information is often sent from one computer to another via a network that technically can be accessed by anybody It provides a degree of security should the information fall into the wrong hands
61ENCRYPTION Encryption is the conversion of data into a form not readily understood by unauthorized people, called cipehertext Decryption is the conversion of encrypted data back into its original form, so it can be understood Encryption can be as simple as substituting numbers for letters, or as complex as rearranging data bits using computer algorithms See Key
62ENCRYPTION The transformation of clear data (clear text) into unintelligible data (ciphertext) Asymmetric encryption, also known as public key encryption, allows for the trading of information without having to share the key used to encrypt the information Information is encrypted using the recipient's public key and then the recipient decrypts the information with their private key Symmetric encryption, also known as private key encryption, allows information to be encrypted and decrypted with the same key Thus the key must be shared with the decrypting party--but anyone who intercepts the key can also use it
63ENCRYPTION The process of encoding data by use of a key to prevent viewing by unauthorized users
64ENCRYPTION the activity of converting from plain text into code
65ENCRYPTION Encryption is the process of scrambling a message so that is can only be read by the party it is intended for Business transactions on the web and e-mail messages are scrambled, or encrypted, for security reasons
66encrypted Past tense of encrypt
67encrypted A form of scrambling a television signal, where the receiver must not only have a descrambling device, but also have its "address" registered with the signal distributor (See also: Addressablility, Clear Feed, Encoded, Scrambling)
68encrypted Similar to "coded" in that it is a way to attempt preserving someone's confidentiality Encrypting is supposed to be more secure, in that not all researchers would necessarily have access to the exact code or method of encryption
69encrypted Information is encrypted by using a formula and a unique, secret "key" value to convert it into encoded data Decoding the data back into useable information requires a copy of the formula and the value of the "key" Encrypted data is considered to be secure from interpretation by unauthorized providers All PharmaNet data is encrypted as it travels on the network
70encrypted means information is converted into a code language before it is sent The receiver has the same software and de-codes the information after it arrives
71encrypted This term refers to carrying a meaning determined by a new, superseding, or additionally-clarified partnership agreement that 1 came into force later than the beginning of current deal and 2 is based on information that may have become available to some players but not others
72encrypting present participle of encrypt
73encryption coding, ciphering; conversion of data into cipher (Computers)  isim
74encryption In cryptography, encryption is the process of obscuring information to make it unreadable without special knowledge, key files, and/or passwords
75encrypts third-person singular of encrypt
More results