Can the computer which has been used for encryption be
traced?
Answers were Sorted based on User's Feedback
Answer / vc
The question is a bit broad to answer definitively - there are many encryption methods (Certs, Shared-Secret, Symmetric Keys, etc) to begin with; Also it depends on other metrics: Whether the encrypted "Data is at Rest" OR "Data is in Motion" OR "Data is in Use". Once the question is crisply qualified answer follows obviously.
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / ankit
it could be traces by the public key of the computer...which
is used to decrypt
| Is This Answer Correct ? | 0 Yes | 1 No |
What is key management ?
What is exhaustive key search ?
What is the rabin signature scheme?
whats cryptanalysis?
What is the difference between hardware and software encryption?
What happens if my key is lost ?
How does one find random numbers for keys ?
Is there a limit on the file size or on the number of encrypted files?
Does encryption of connection strings in web.config file possible? How?
WHAT IS A SAMPLE USER INTERFACE OF DES ENCRYPTION/DECRYPTION PROJECT?
what is trapdoor and how does it works?
How does one get a key pair ?