How to Use decrypt in a Sentence

decrypt

verb
  • There wasn’t any gap to jump in and get the files decrypted.
    Michael Kan, PCWorld, 15 May 2017
  • Then Kessler’s colleague would transmit a code to decrypt the files.
    Jacob Bernstein, New York Times, 29 Nov. 2019
  • And only the user can retrieve, decode and decrypt the file by means of a private key.
    Max (chong) Li, Forbes, 7 May 2023
  • Reformat it a second time so the next user doesn’t get a prompt to decrypt it.
    Rob Pegoraro, USA TODAY, 5 July 2018
  • The hackers will then demand a ransom be paid out in order to have the files decrypted.
    Allen Kim, CNN, 8 Oct. 2019
  • The data can only be decrypted on an endpoint machine with the same key used by the sender.
    Dan Goodin, Ars Technica, 1 Mar. 2023
  • By default, this is encrypted when sent to Zoom, but Zoom can decrypt it.
    Barath Raghavan, IEEE Spectrum, 5 Nov. 2023
  • The access controller will encrypt a datagram to the tag, and the private key will decrypt it and then re-encrypt it and send it back to the reader.
    Yael Grauer, Ars Technica, 3 Jan. 2018
  • In most cases, the data is decrypted every time it is read from disk.
    Barath Raghavan, IEEE Spectrum, 5 Nov. 2023
  • There’s no evidence that the threat actor could decrypt or use any of the certificates.
    Dan Goodin, Ars Technica, 30 Jan. 2023
  • For the truly paranoid, disabling plugins that decrypt messages in the email client is the safest measure.
    Dan Goodin, Ars Technica, 14 May 2018
  • Perhaps in the future, spies will be advised to keep a gallon of ethanol handy to decrypt their instructions.
    Veronique Greenwood, Discover Magazine, 4 Aug. 2011
  • As the only one with the private encryption key, only the user can decrypt their files.
    Dallas News, 28 Oct. 2022
  • The public key is used to encrypt messages sent by others; the private key, which is kept secret, is used to decrypt them.
    Anna Wiener, The New Yorker, 19 Oct. 2020
  • With both keys, one team could decrypt a transmission that the other team encrypted with its key.
    Davide Castelvecchi, Scientific American, 16 Feb. 2018
  • That's because the keys to decrypt your address book data aren't in memory yet.
    Lily Hay Newman, Wired, 13 Jan. 2021
  • Even with the physical phone in custody, the data was encrypted, and Apple didn’t know the password to decrypt it.
    Russell Brandom, The Verge, 20 Aug. 2018
  • The task force tries to steal a cipher machine that can decrypt coded messages, and Townsend tests Liz’s loyalty.
    Anying Guo, Washington Post, 30 Apr. 2021
  • Even if the data is encrypted, bad actors can store the data and decrypt it at a later time or hold it for ransom.
    John Prisco, Forbes, 4 May 2022
  • This has long been a challenge for researchers because the digital code used to encrypt a photograph has to be the same one used to decrypt it.
    Harini Barath, Scientific American, 16 Sep. 2021
  • The key is required to decrypt the contents of such a database, and there are tools readily available to access the WhatsApp database on a PC.
    Derek Hawkins, Washington Post, 18 June 2018
  • Oh, also, researchers have found a way to decrypt ubiquitous GSM calls.
    Lily Hay Newman, WIRED, 17 Aug. 2019
  • But clients who don’t want to give in to extortion are susceptible to firms that claim to have their own methods of decrypting files.
    Renee Dudley, ProPublica, 24 June 2019
  • But the developer who found them was able to decrypt the information.
    Chris Smith, BGR, 12 Aug. 2021
  • The Oblivious resolver has the key needed to decrypt the request but no information about who placed it.
    Barath Raghavan, IEEE Spectrum, 5 Nov. 2023
  • To decrypt a victim's disk, threat actors need the installation ID.
    Dan Goodin, Ars Technica, 28 June 2017
  • This add-on feature provides client-side encryption, which means that only the user can decrypt stored files.
    Dallas News, 28 Oct. 2022
  • Using one, a receiver can decrypt a message which has been encrypted with the key in question.
    The Economist, 31 Aug. 2017
  • The malware encrypts data on a PC and shows users a note demanding $300 in bitcoin to have their data decrypted.
    Michael Kan, PCWorld, 12 May 2017
  • Knowing what the prime numbers were would allow someone to discover the key, and decrypt the messages encoded with them.
    Sean Gallagher, Ars Technica, 29 Aug. 2019

Some of these examples are programmatically compiled from various online sources to illustrate current usage of the word 'decrypt.' Any opinions expressed in the examples do not represent those of Merriam-Webster or its editors. Send us feedback about these examples.

Last Updated: