Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Can the computer which has been used for encryption be
traced?

Answer Posted / ankit

it could be traces by the public key of the computer...which
is used to decrypt

Is This Answer Correct ?    0 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

why hash functions are not used for encryption but authentication ?

1910


What are "stream" and "block" ciphers?

2003


Blowfish uses the longest key. Does this mean it is the strongest cipher?

2324


What is a zed encoder? How does it work?

2768


What are knapsack cryptosystems?

927


What is meant by 1024, 2048, 5096 bit encryption?

3676


What is nonlinear cryptography?

6300


Does encryption of connection strings in web.config file possible? How?

971


What is probabilistic encryption?

957


How do certifying authorities store their private keys ?

2505


Is there a limit on the file size or on the number of encrypted files?

1971


whats cryptanalysis?

2117


what is trapdoor and how does it works?

2127


What is multiple encryption?

960


How to remove the Kryptel (Silver Key) icon from the desktop?

2049