from The American Heritage® Dictionary of the English Language, 5th Edition.

  • transitive verb To put into code or cipher.
  • transitive verb Computers To alter (data) using a mathematical algorithm so as to make the data unintelligible to unauthorized users while allowing a user with a key or password to convert the altered data back to its original state.

from the GNU version of the Collaborative International Dictionary of English.

  • transitive verb to convert ordinary language into code; to hide the meaning of a message by converting it into a form that cannot be interpreted without knowing the secret method for interpretation, called the key.

from Wiktionary, Creative Commons Attribution/Share-Alike License.

  • verb To conceal information by means of a code or cipher.

from WordNet 3.0 Copyright 2006 by Princeton University. All rights reserved.

  • verb convert ordinary language into code


from The American Heritage® Dictionary of the English Language, 4th Edition

en-1 + (de)crypt.


  • The term encrypt t1; t2 represents t1 encrypted with t2 and is usually written as ft1 gt2.

    Recently Uploaded Slideshows

  • On the "Tools" menu in Microsoft Outlook, for example, "encrypt" is an option.

    Homeland Insecurity

  • My Actiontec DSL router is set with WPA2 -- for some reason the printer insists that the password encrypt is TKIP when it is actually AES. RSS Feed - Daily Deals

  • Yahoo Messenger 6 used a spectacularly complicated password obfuscation method to "encrypt" the password as it was being sent over the wire to Yahoo's servers.

    Pidgin News

  • One catch only: as it is not a signal carrying info but just power, no way to "encrypt" it while receiver technology is trivial ....

    Original Signal - Transmitting Digg

  • There are software products that will put your e-mail messages in secret code ( "encrypt") so that they cannot be read by anyone but the intended recipient.

    Consumer Action

  • You can control whether a connection encrypts all data to and from the server after login using the 'encrypt' connection property.

    MSDN Blogs

  • With some hesitation, she described how two people with identical copies of a book could use page numbers, line numbers, and even specific word numbers to encrypt and decode messages.


  • He was worried, however, about the CIA discovering that he was going off the reservation by communicating directly with the IAEA and he suggested that they adopt a code to encrypt future communications.


  • At Corning, Mr. Meadows has to pick and choose among Android devices to determine which ones can safely run on the company's corporate network—looking for phones that can encrypt data, enforce password requirements and allow the phone to be erased remotely.

    Targets Shift in Phone Wars


Log in or sign up to get involved in the conversation. It's quick and easy.