Dictionary.com
Thesaurus.com
Showing results for encryption. Search instead for data encryption.

encryption

American  
[en-krip-shuhn] / ɛnˈkrɪp ʃən /

noun

  1. the act or practice of converting messages into cipher or code.

    During World War II, the encryption process involved code tables and a machine.

  2. Computers. the act or practice of changing digital data into a form that cannot be read without converting it back using a unique key.

    Though its data encryption is strong, the app has other security flaws exploited by hackers.


encryption Cultural  
  1. The process of encoding a message so that it can be read only by the sender and the intended recipient. Encryption systems often use two keys, a public key, available to anyone, and a private key that allows only the recipient to decode the message. (See also cryptography.)


Etymology

Origin of encryption

First recorded in 1940–45; 1960–65 encryption for def. 2; encrypt ( def. ) + -ion ( def. )

Explanation

Encryption is the process of translating something into a code, so that data is protected, hidden, or concealed. Encryption makes it difficult for hackers to steal people's credit card numbers. If there's information worth stealing, encryption is used to protect it — especially when it comes to computer or electronic data that holds financial, private, or dangerous material. Governments use encryption to hide classified information, and banks use it to protect their customers' money and other data. Crypt- has been used to mean "secret or hidden" since the 1700s, and it comes from a Greek root, kryptos, "hidden or concealed."

Keep Reading on Vocabulary.com

Vocabulary lists containing encryption

Example Sentences

Examples are provided to illustrate real-world usage of words in context. Any opinions expressed do not reflect the views of Dictionary.com.

One of the most promising approaches is quantum cryptography, which uses individual photons to generate encryption keys.

From Science Daily • Apr. 1, 2026

“The threat to encryption is relevant today with store-now-decrypt-later attacks, while digital signatures are a future threat,” the company wrote.

From Barron's • Apr. 1, 2026

Last week Google set 2029 as a potential milestone for a future quantum computer that can break current encryption for crypto.

From MarketWatch • Mar. 31, 2026

NordVPN uses AES-256 encryption with OpenVPN and ChaCha20 with their NordLynx protocol.

From Salon • Mar. 30, 2026

Covering more than fifty encryption systems, the book testifies to the doggedness and ingenuity of Elizebeth and her team.

From "The Woman All Spies Fear" by Amy Butler Greenfield