Can the computer which has been used for encryption be
traced?
Answer Posted / ankit
it could be traces by the public key of the computer...which
is used to decrypt
| Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers
Blowfish uses the longest key. Does this mean it is the strongest cipher?
What are the cfb and ofb modes?
What is are "proprietary" and "public" cryptographic algorithms?
What are some other public key cryptosystems ?
What are the counter and pcbc modes?
How to change the location of the Kryptel (Silver Key) program group?
What is cryptographic synchronisation?
What is merkles tree signature scheme?
How to I prevent other users from using Kryptel (Silver Key)?
What is secret-key cryptography ?
How to remove the Kryptel (Silver Key) icon from the desktop?
What information can be obtained from encrypted file?
What are the advantages of public-key cryptography compared with secret-key cryptography?
Do digital signatures help detect altered documents and transmission errors?
What is decryption?