Also found in: Dictionary, Medical, Financial, Encyclopedia, Wikipedia.
Graphic Thesaurus  🔍
Display ON
Animation ON
  • verb

Synonyms for decrypt

to find the key to (a code, for example)

Synonyms for decrypt

convert code into ordinary language

Related Words

References in periodicals archive ?
Although an attacker may obtain the encrypted file header, encrypted ID, and encrypted disk file, the attacker will not have the information needed to decrypt the encrypted data since the user PW and the hash value of the PW used as the key are not transferred to the flash drive but are utilized only inside the management program.
Step 1: Decrypt [EU'.sub.i] using sk to generate [U'.sub.i] = ([V'.sub.i], [ts'.sub.i]]).
At the hard disk level, users must enter a password or key to decrypt the device before they can use it.
There has yet to be any contact between the ransomware creator and a victim of the attack, and appears to be no payment may to decrypt files.
The absolute value of the output of (3) turns out the decrypted image DI(x, y) = OI(x, y).
For more information, please visit the ApexSQL Decrypt product page.
But a similar vulnerability can still be exploited by attackers with nation-state-sized budgets to passively decrypt the 1024-bit Diffie-Hellman key sizes that many implementations still use by default.
Certain computations are to be taken place to decrypt the ciphertext which gives back the original plain text.
In classical schemes, the ciphertext data therefore needs to be decrypted entirely before any useful operations can be done on it.
Shortly thereafter, a "ransom note" appears with an offer to decrypt the data for a fee, ranging from a few hundred to a few thousand dollars.
(2) Make use of the RSA public key to decrypt the encrypted summary [2].
Once an infected USB stick is plugged into a vulnerable computer, the malware is executed and tries to decrypt the payload by creating a key to unlock it.
The CloudCracker output can then be used with ChapCrack to decrypt an entire session captured with WireShark or other similar network sniffing tools.
A Colorado court has ordered a woman to decrypt her hard drive in a mortgage trial, while an Atlanta court has decided not to force a child abuse suspect to decrypt his hard drive because doing so would violate his Fifth Amendment rights.
The Key Management Component is the complete set of operations to create, maintain, and control the keys necessary to encrypt and decrypt data.