Can the computer which has been used for encryption be
traced?
Answers were Sorted based on User's Feedback
Answer / vc
The question is a bit broad to answer definitively - there are many encryption methods (Certs, Shared-Secret, Symmetric Keys, etc) to begin with; Also it depends on other metrics: Whether the encrypted "Data is at Rest" OR "Data is in Motion" OR "Data is in Use". Once the question is crisply qualified answer follows obviously.
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / ankit
it could be traces by the public key of the computer...which
is used to decrypt
| Is This Answer Correct ? | 0 Yes | 1 No |
What happens when a key expires ?
How can we use quantum properties in cryptography ?
What are the disadvantages of public-key cryptography compared with secret-key cryptography?
Blowfish uses the longest key. Does this mean it is the strongest cipher?
What happens if my key is lost ?
What is an encryption "key" and what is the importance of key length?
How to change the encrypted file icon?
How Encoding is different from Encryption?
What is the rabin signature scheme?
What is the difference between Kryptel and Silver Key?
what is the difference between encryption and hashing?
what is trapdoor and how does it works?