How to Use decrypt in a Sentence

decrypt

verb
  • That means it's encrypted from one end user to the other with the company in between not even being able to decrypt the information and look at it themselves or share it with law enforcement.
    Lauren Goode, WIRED, 5 Sep. 2024
  • There wasn’t any gap to jump in and get the files decrypted.
    Michael Kan, PCWorld, 15 May 2017
  • Then Kessler’s colleague would transmit a code to decrypt the files.
    Jacob Bernstein, New York Times, 29 Nov. 2019
  • And only the user can retrieve, decode and decrypt the file by means of a private key.
    Max (chong) Li, Forbes, 7 May 2023
  • Reformat it a second time so the next user doesn’t get a prompt to decrypt it.
    Rob Pegoraro, USA TODAY, 5 July 2018
  • No one, not even people who work at Telegram, can decrypt it.
    PCMAG, 20 May 2024
  • The hackers will then demand a ransom be paid out in order to have the files decrypted.
    Allen Kim, CNN, 8 Oct. 2019
  • The data can only be decrypted on an endpoint machine with the same key used by the sender.
    Dan Goodin, Ars Technica, 1 Mar. 2023
  • By default, this is encrypted when sent to Zoom, but Zoom can decrypt it.
    Barath Raghavan, IEEE Spectrum, 5 Nov. 2023
  • The access controller will encrypt a datagram to the tag, and the private key will decrypt it and then re-encrypt it and send it back to the reader.
    Yael Grauer, Ars Technica, 3 Jan. 2018
  • The agency said victims should reach out to the FBI through this website to see if their systems can be decrypted.
    Lauren Feiner, The Verge, 20 Feb. 2024
  • In most cases, the data is decrypted every time it is read from disk.
    Barath Raghavan, IEEE Spectrum, 5 Nov. 2023
  • There’s no evidence that the threat actor could decrypt or use any of the certificates.
    Dan Goodin, Ars Technica, 30 Jan. 2023
  • For the truly paranoid, disabling plugins that decrypt messages in the email client is the safest measure.
    Dan Goodin, Ars Technica, 14 May 2018
  • Perhaps in the future, spies will be advised to keep a gallon of ethanol handy to decrypt their instructions.
    Veronique Greenwood, Discover Magazine, 4 Aug. 2011
  • As the only one with the private encryption key, only the user can decrypt their files.
    Dallas News, 28 Oct. 2022
  • The public key is used to encrypt messages sent by others; the private key, which is kept secret, is used to decrypt them.
    Anna Wiener, The New Yorker, 19 Oct. 2020
  • With both keys, one team could decrypt a transmission that the other team encrypted with its key.
    Davide Castelvecchi, Scientific American, 16 Feb. 2018
  • That's because the keys to decrypt your address book data aren't in memory yet.
    Lily Hay Newman, Wired, 13 Jan. 2021
  • So before the 1970s, most cryptography was symmetric in the sense that the same key would be used to encrypt and decrypt a message.
    Quanta Magazine, 1 Aug. 2024
  • Even with the physical phone in custody, the data was encrypted, and Apple didn’t know the password to decrypt it.
    Russell Brandom, The Verge, 20 Aug. 2018
  • The task force tries to steal a cipher machine that can decrypt coded messages, and Townsend tests Liz’s loyalty.
    Anying Guo, Washington Post, 30 Apr. 2021
  • Even if the data is encrypted, bad actors can store the data and decrypt it at a later time or hold it for ransom.
    John Prisco, Forbes, 4 May 2022
  • This has long been a challenge for researchers because the digital code used to encrypt a photograph has to be the same one used to decrypt it.
    Harini Barath, Scientific American, 16 Sep. 2021
  • The key is required to decrypt the contents of such a database, and there are tools readily available to access the WhatsApp database on a PC.
    Derek Hawkins, Washington Post, 18 June 2018
  • Oh, also, researchers have found a way to decrypt ubiquitous GSM calls.
    Lily Hay Newman, WIRED, 17 Aug. 2019
  • But clients who don’t want to give in to extortion are susceptible to firms that claim to have their own methods of decrypting files.
    Renee Dudley, ProPublica, 24 June 2019
  • But the developer who found them was able to decrypt the information.
    Chris Smith, BGR, 12 Aug. 2021
  • The Oblivious resolver has the key needed to decrypt the request but no information about who placed it.
    Barath Raghavan, IEEE Spectrum, 5 Nov. 2023
  • To decrypt a victim's disk, threat actors need the installation ID.
    Dan Goodin, Ars Technica, 28 June 2017

Some of these examples are programmatically compiled from various online sources to illustrate current usage of the word 'decrypt.' Any opinions expressed in the examples do not represent those of Merriam-Webster or its editors. Send us feedback about these examples.

Last Updated: