encrypting - meaning and definition. What is encrypting
Diclib.com
Online Dictionary

What (who) is encrypting - definition

PROCESS OF ENCODING INFORMATION, WHICH IS CONVERSION OF THE ORIGINAL REPRESENTATION OF THE INFORMATION, KNOWN AS PLAINTEXT, INTO AN ALTERNATIVE FORM KNOWN AS CIPHERTEXT
CipheR; Decrypt; Decryption; Decrypting; Data encryption; Encryption algorithm; Encrypt; Encrypting; Ciphertexts; Data encryption software; Decrypter; List of ciphers; Cipher algorithm; Encrypted; Encryptional wired system; Network encryption; Encryption algorithms; Decryption key; Encryption and decryption; Cryptographic algorithm; Encrypts; Cryptography algorithm; Draft:Encrytpion Algorithms
  • A simple illustration of [[public-key cryptography]], one of the most widely used forms of encryption

encrypt         
(encrypts, encrypting, encrypted)
If a document or piece of information is encrypted, it is written in a special code, so that only certain people can read it.
Account details are encrypted to protect privacy.
...a program that will encrypt the information before sending.
...encrypted signals.
VERB: be V-ed, V n, V-ed
encryption
It is currently illegal to export this encryption technology from the US.
N-UNCOUNT: oft N n
encrypt         
[?n'kr?pt]
¦ verb convert into code.
Derivatives
encryption noun
Origin
1950s: from en-1 + Gk kruptos 'hidden'.
Hardware-based full disk encryption         
TERM
Disk encryption hardware; Hardware-based Full Disk Encryption; Self-encrypting drive; Self encrypting drive; Self-encrypting device; Self-encrypting disk; Self-Encrypting Device
Hardware-based full disk encryption (FDE) is available from many hard disk drive (HDD/SSD) vendors, including: ClevX, Hitachi, Integral Memory, iStorage Limited, Micron, Seagate Technology, Samsung, Toshiba, Viasat UK, Western Digital. The symmetric encryption key is maintained independently from the computer's CPU, thus allowing the complete data store to be encrypted and removing computer memory as a potential attack vector.

Wikipedia

Encryption

In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.

For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users.

Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often used in military messaging. Since then, new techniques have emerged and become commonplace in all areas of modern computing. Modern encryption schemes use the concepts of public-key and symmetric-key. Modern encryption techniques ensure security because modern computers are inefficient at cracking the encryption.

Pronunciation examples for encrypting
1. But with modern encrypting techniques,
ted-talks_1768_DidierSornette_2013G-320k
2. Google started encrypting their links
Communications Security _ Phil Zimmermann _ Talks at Google
3. out of Advanced Encrypting in Bethesda.
The Recruit (2003)
4. the process for encrypting and decrypting messages.
ted-talks_2204_AndyYen_2014G-320k
5. so too were banks and companies encrypting their communications
Secret Code Girls of World War II _ Liza Mundy _ Talks at Google
Examples of use of encrypting
1. Some would require companies to take more concrete steps, such as encrypting customer information.
2. The schools claim that encrypting technology makes it completely inaccessible to outsiders.
3. Carbonite runs in the background of a Windows–based computer, copying files, encrypting them and sending them to remote servers.
4. Speaking publicly for the first time last night, Mr Gilbertson claimed he had had a unique opportunity to monitor the extremists, including encrypting their emails.
5. The lawsuit asked the court to order TSA to take new security measures consistent with those laws, including encrypting personnel data and installing electronic monitoring on any mobile equipment that stores personnel information.