English - Turkish

  1. kriptolamak Askeri
  2. sifrele
  3. KRİPTOLAMAK: Kripto sistemi ile açık bir metni kapatarak anlaşılmaz şekle koymak. (Not: Kriptolamak terimi, şifrelemek ve kodlamak anlamlarını da kapsar). Ayrıca bakınız: "cryptosystem" Askeri
  4. şifrele
  5. şifreler encrypts
  6. şifreli Bilgisayar encrypted
  7. şifrelendi Bilgisayar encrypted
  8. şifrelenmiş Bilgisayar encrypted
  9. şifreleniyor Bilgisayar encrypting
  10. şifreleme Bilgisayar encrypting
  11. kriptolama Askeri encryption
  12. İnternet Üzerinde Transfer edilen Bilgilerin Üçüncü şahıslar tarafından okunmasını engellemek amacıyla şifrelenmesi encryption

English - English

  1. To conceal information by means of a code or cipher
  2. To encode data for secure transfer over the Internet
  3. Using an algorithm to transform data to conceal its meaning or value
  4. To convert plain text into unintelligible form by means of a cryptosystem This cryptosystem can be manual or electronic
  5. To translate data into code that cannot be read without presenting the proper password
  6. To encipher or encode
  7. To make temporarily unreadable Datasets can be encrypted to ensure privacy See the A3C Connection article on encryption at: http: //www uic edu/depts/accc/newsletter/adn16/encrypt html
  8. To convert data (such as plaintext) into a format that is no longer readable without a password
  9. To convert plain text into unintelligible forms by means of a cipher system (crypto system) Encryption (and decryption) can be implemented in software on computers or in hardware - the set of mathematical logic that actually converts (encrypts/decrypts) data
  10. To encode data so that only someone with a key can read it
  11. To convert plain text into a different form in order to conceal its meaning
  12. To change a message into the unreadable form that can be openly transmitted
  13. To scramble data or to convert data to a secret code that masks the meaning of the data to any unauthorized recipient
  14. Encoding something so others can not read it without having a key to unlock the information
  15. To make computer (or other) data unreadable in an orderly fashion, so it can be decrypted later and easily read Related terms: Data
  16. encode, convert a message into code (especially secret) fiil
  17. transform clear-text into cipher-text
  18. convert ordinary language into code; "We should encode the message for security reasons"
  19. To programmatically disguise content to hide its substance Encrypted content, often called a cipher, cannot be played without reversing its format into clear content through the process of decryption
  20. encryption is the use of a mathematical based method of "scrambling" the data before it is sent over the data network so that it becomes unreadable except by authorized users The current de-facto standard for encryption for web based traffic is SSL (Secure Sockets Layer)
  21. encrypted encryption to write a message in such a way that others cannot read it without having the proper decryption method; to encypher
  22. A way to protect data by encoding it so that it appears as a random sequence of characters
  23. To render permanently cryptic
  24. To make computer (or other) data unreadable in an orderly fashion, so it can be decrypted later and easily read
  25. To scramble the contents of a file or message in such a way as to make it unreadable to everyone except those with a software 'key', which makes it possible to unscramble the encrypted file or message Currently the length of encryption keys can range up to around 2048-bits See also: cryptography
  26. If a document or piece of information is encrypted, it is written in a special code, so that only certain people can read it. Account details are encrypted to protect privacy. a program that will encrypt the information before sending. encrypted signals. + encryption en·cryp·tion It is currently illegal to export this encryption technology from the US. to protect information by putting it into a special code that only some people can read, especially information that is on a computer decrypt (en- + crypt- (as in cryptogram))
  27. Simple past tense and past participle of encrypt encrypted
  28. Describing something that is in code - "The encrypted text was unreadable." encrypted
  29. The process of obscuring information to make it unreadable without special knowledge, key files, and/or passwords encryption
  30. A means of making data unreadable to everyone except the receiver Encryption is often used to make the transmission of credit card numbers secure for those who are shopping using the Internet ENCRYPTION
  31. A method of scrambling or encoding data to prevent unauthorized users from reading or tampering with the data Only individuals with access to a password or key can decrypt and use the data The data can include messages, files, folders, or disks ENCRYPTION
  32. Encryption is the process of changing data into a form that can be read only by the intended receiver To decipher the message, the receiver of the encrypted data must have the proper decryption key In traditional encryption schemes, the sender and the receiver use the same key to encrypt and decrypt data Public-key encryption schemes use two keys: a public key, which anyone may use, and a corresponding private key, which is possessed only by the person who created it With this method, anyone may send a message encrypted with the owner's public key, but only the owner has the private key necessary to decrypt it PGP (Pretty Good Privacy) and DES (data encryption standard) are two of the most popular public-key encryption schemes For more information go to http: //security tao ca/crypt_basics html ENCRYPTION
  33. A means of scrambling data so that the receiver only can read it Encryption is generally used to guarantee the security of credit card transactions online Back to Top ENCRYPTION
  34. Translating data or documents into a code that cannot be read without a "key " Encryption is the best way to ensure that e-mail is not intercepted and tampered with between the time it is sent and the time it is received, but the technology is not yet user friendly enough to warrant everyday use Encryption also does not offer any protection once the document has been decrypted by the recipient, since it can be altered at that point PGP is currently the most commonly-used encryption software Back to top ENCRYPTION
  35. Encryption is the transformation of data into a form unreadable by anyone without a secret decryption key Its purpose is to ensure privacy by keeping the information hidden from anyone for whom it was not intended, including those who can see the encrypted data Encryption may be used to make stored data private (e g , data that is stored on a potentially vulnerable hard disk), or to allow a nonsecure communications channel to serve as a private communications channel Encryption is sometimes described as the process of converting plain text into cipher text ENCRYPTION
  36. Encryption is the process of converting readable data into unreadable characters to prevent unauthorized access To read encrypted data, the data must decrypted; the only parties capable of viewing encrypted data are the sender and the receiver ENCRYPTION
  37. A way of coding the information in a file or e-mail message so that if it is intercepted by a third party as it travels over a network it cannot be read Only the person or persons that have the right type of decoding software can unscramble the message See also Cryptography ENCRYPTION
  38. The conversion of data into a form, called ciphertext, that cannot be easily understood by unauthorized people The complementary process, decryption, converts encrypted data back into its original form ENCRYPTION
  39. Prevents any non-authorized party from reading or changing data The level of protection provided by encryption is determined by an encryption algorithm In a brute-force attack, the strength is measured by the number of possible keys and the key size For example, a Triple-Data Encryption Standard system (3 DES) uses 112-bit or 168-bit keys and, based on currently available processing power, is virtually immune to brute-force attacks Business to Business VPNs (Extranets) share sensitive data with multiple organizations, so demand the highest level of security This requires public key encryption and/or secure key exchange, both of which are designed to eliminate the risk of the key becoming known to an unauthorized party ENCRYPTION
  40. In order to provide data security, data transmission is often encrypted or scrambled by the sender The receiver has the key to the encryption system, and thus is the only one who can read the information ENCRYPTION
  41. The translation of data into a secret code Encryption is the most effective way to achieve data security To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it Unencrypted data is called plain text; encrypted data is referred to as cipher text There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption ENCRYPTION
  42. A way of coding information in a file or e-mail message so that if it is intercepted by a third party as it travels over a network it cannot be read [San Diego State University] ENCRYPTION
  43. The process of encoding information in an attempt to make it secure from unauthorized access The reverse of this process is known as decryption ENCRYPTION
  44. Encryption is a complex coding scheme to prevent eavesdroppers from reading information they are not entitled to read ENCRYPTION
  45. The transformation of plaintext into an apparently less readable form (called ciphertext) through a mathematical process The ciphertext may be read by anyone who has the key that decrypts (undoes the encryption) the ciphertext ENCRYPTION
  46. Encryption is the conversion of data, using a mathematical algorithm, into a form that cannot be read by unauthorised users Authorised users must be provided with a decryption key in order to unscramble the information There are different strengths of data encryption, determined by the length (in bits) of the key used In general, the longer the key, the stronger the encryption, the more secure the data ENCRYPTION
  47. The process of transforming plaintext data into an unintelligible form (ciphertext) such that the original data either cannot be recovered (one-way encryption) or cannot be recovered without using an inverse decryption process (two-way encryption) ENCRYPTION
  48. The process of converting data into "unreadable code" is so that prying eyes cannot understand the content Encryption is necessary as valuable and sensitive information is often sent from one computer to another via a network that technically can be accessed by anybody It provides a degree of security should the information fall into the wrong hands ENCRYPTION
  49. Encryption is the conversion of data into a form not readily understood by unauthorized people, called cipehertext Decryption is the conversion of encrypted data back into its original form, so it can be understood Encryption can be as simple as substituting numbers for letters, or as complex as rearranging data bits using computer algorithms See Key ENCRYPTION
  50. The transformation of clear data (clear text) into unintelligible data (ciphertext) Asymmetric encryption, also known as public key encryption, allows for the trading of information without having to share the key used to encrypt the information Information is encrypted using the recipient's public key and then the recipient decrypts the information with their private key Symmetric encryption, also known as private key encryption, allows information to be encrypted and decrypted with the same key Thus the key must be shared with the decrypting party--but anyone who intercepts the key can also use it ENCRYPTION


About This Word

    Pronunciation /enˈkrəpt, ənˈkrəpt/ /ɛnˈkrɪpt, ɪnˈkrɪpt/
    Etymology [ in-'kript, en- ] (transitive verb.) 1944. en- + crypt-.
    Antonyms decrypt
    Tenses encrypting, encrypted
    Word of the day aceldama