Can the computer which has been used for encryption be
traced?
Answers were Sorted based on User's Feedback
Answer / vc
The question is a bit broad to answer definitively - there are many encryption methods (Certs, Shared-Secret, Symmetric Keys, etc) to begin with; Also it depends on other metrics: Whether the encrypted "Data is at Rest" OR "Data is in Motion" OR "Data is in Use". Once the question is crisply qualified answer follows obviously.
Is This Answer Correct ? | 4 Yes | 0 No |
Answer / ankit
it could be traces by the public key of the computer...which
is used to decrypt
Is This Answer Correct ? | 0 Yes | 1 No |
Can the computer which has been used for encryption be traced?
What is decryption?
Who needs a key pair ?
What are some other public key cryptosystems ?
What are the counter and pcbc modes?
What is public-key cryptography ?
What if a certifying authority?s key is lost or compromised ?
What is meant by 1024, 2048, 5096 bit encryption?
What is merkles tree signature scheme?
What is are "proprietary" and "public" cryptographic algorithms?
How to I prevent other users from using Kryptel (Silver Key)?
What are "stream" and "block" ciphers?