Can the computer which has been used for encryption be
traced?
Answer Posted / priya
R u sure Sreenath?
| Is This Answer Correct ? | 5 Yes | 1 No |
Post New Answer View All Answers
What is decryption?
What are "stream" and "block" ciphers?
What is cryptographic synchronisation?
How Encoding is different from Encryption?
What is an encryption "key" and what is the importance of key length?
What information can be obtained from encrypted file?
How to remove the Kryptel (Silver Key) icon from the desktop?
How is an s-box value of AES can be modified? How is it done?
What are the counter and pcbc modes?
What is the difference between a message authentication code (MAC) and a one-way hash?
What is key management ?
How do certifying authorities store their private keys ?
What is the difference between Kryptel and Silver Key?
What is luc?
why hash functions are not used for encryption but authentication ?