Can the computer which has been used for encryption be
traced?
Answer Posted / ankit
it could be traces by the public key of the computer...which
is used to decrypt
| Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers
why hash functions are not used for encryption but authentication ?
What are "stream" and "block" ciphers?
Blowfish uses the longest key. Does this mean it is the strongest cipher?
What is a zed encoder? How does it work?
What are knapsack cryptosystems?
What is meant by 1024, 2048, 5096 bit encryption?
What is nonlinear cryptography?
Does encryption of connection strings in web.config file possible? How?
What is probabilistic encryption?
How do certifying authorities store their private keys ?
Is there a limit on the file size or on the number of encrypted files?
whats cryptanalysis?
what is trapdoor and how does it works?
What is multiple encryption?
How to remove the Kryptel (Silver Key) icon from the desktop?