How to Use cryptographic in a Sentence
cryptographic
adjective-
The idea behind the blockchain is to replace that sense of trust with cryptographic proof.
— Cynthia Littleton, Variety, 18 Aug. 2022 -
The hash function is like a cryptographic one-way street.
— Kevin Korte, Forbes, 28 Nov. 2023 -
But the researchers say their goal was to work through the cryptographic challenges to show that such a system could be built.
— Lily Hay Newman, Wired, 29 Jan. 2021 -
These hashes and a cryptographic key linked to the user’s app are stored in a database on the Worldcoin blockchain.
— IEEE Spectrum, 28 Aug. 2023 -
Each time a legitimate change is made, the browser takes a cryptographic hash of some of the code.
— Dan Goodin, Ars Technica, 3 Aug. 2022 -
When the fob responds with the cryptographic message that unlocks and starts the vehicle, the crook's repeater relays it to the car.
— Dan Goodin, Ars Technica, 7 Apr. 2023 -
Had modern cryptographic algorithms been available to the crooks in this tale, Holmes would have been out of luck.
— PCMAG, 22 Aug. 2023 -
To Duane, who was busy working on a cryptographic algorithm at the time, the anomaly hardly looked like cause for alarm.
— Andy Greenberg, Wired, 20 May 2021 -
Only people who hold the correct cryptographic keys can read the records.
— IEEE Spectrum, 7 Nov. 2022 -
In contrast, many hundreds of qubits or more may be required to store just one of the huge numbers used in current cryptographic codes.
— Dennis Overbye, New York Times, 21 Oct. 2019 -
The consequences of the capture of the machines and cryptographic keys were very serious.
— WSJ, 5 June 2018 -
It can be used to achieve a lot of other cryptographic primitives.
— Quanta Magazine, 1 Aug. 2024 -
Both are based on a cryptographic standard called C2PA.
— Jeremy Kahn, Fortune, 23 Jan. 2024 -
In short, NFTs are cryptographic tokens that represent a unique asset on the blockchain.
— Yusuf Berkan Altun, Forbes, 8 Nov. 2021 -
For the generative art piece, Yard wrote 12 lines of code that randomised the cryptographic key of the first Tor onion website, which will soon be removed and revamped.
— Rashi Shrivastava, Forbes, 18 June 2021 -
The user device then sends the site being logged into a cryptographic proof that the private key resides on the device logging in.
— Dan Goodin, Ars Technica, 12 May 2023 -
More secure yet, the 2FA is in the form of a cryptographic token sent by a security key attached to a device logging in.
— Dan Goodin, Ars Technica, 1 Aug. 2018 -
Plus: The man behind the cryptographic technique, the danger in calculating risks, and fries worth a small fortune.
— Steven Levy, Wired, 6 Aug. 2021 -
In the latter case, the transaction generates a 10-digit cryptographic hash that encodes the parties to the transaction and the amount.
— Gilad Edelman, Wired, 28 Mar. 2022 -
The logs use what's known as a Merkle tree to maintain the integrity of the records within them, a cryptographic structure that speeds up the process of checking large amounts of data for any tampering.
— David Nield, WIRED, 20 Aug. 2023 -
This method is used to replace data with either one-way or two-way cryptographic tokens.
— Sonal Rattan, Forbes, 4 June 2021 -
The attacker then compares the encrypted and plaintext traffic from the second call to deduce the cryptographic bits used to encrypt the call.
— Dan Goodin, Ars Technica, 13 Aug. 2020 -
Every 10 minutes, all the miners in the network race to solve a series of complex cryptographic math problems.
— Louise Matsakis, WIRED, 28 May 2018 -
Namely, lawyer Preston Byrne proposed that authors should append a cryptographic hash to the cover of their books.
— Jeff John Roberts, Fortune Crypto, 21 Feb. 2023 -
In all that time, no one has proven themselves to be Nakamoto to the satisfaction of the members of the cryptographic community that helped give birth to bitcoin.
— Garrett M. Graff, WIRED, 1 July 2018 -
There is a public record of how many guesses miners have made in their attempts to solve Bitcoin’s cryptographic puzzles.
— IEEE Spectrum, 10 Jan. 2024 -
The technique will expose the cryptographic hash masking the user password.
— Dan Goodin, Ars Technica, 26 June 2024 -
This passkey, which is made up of a cryptographic key pair, replaces your traditional password and is synced across iCloud’s Keychain.
— WIRED, 9 Sep. 2022 -
Because the conversion works in only one direction—from plaintext to hash—there is no cryptographic means for converting the hashes back into plaintext.
— Dan Goodin, Ars Technica, 27 Sep. 2024 -
This is achieved through the presentation of verifiable credentials, and users prove possession of their private keys with cryptographic signatures, and utilise biometrics for secure device access and key management.
— Alastair Johnson, Forbes, 24 Sep. 2024
Some of these examples are programmatically compiled from various online sources to illustrate current usage of the word 'cryptographic.' Any opinions expressed in the examples do not represent those of Merriam-Webster or its editors. Send us feedback about these examples.
Last Updated: