Can the computer which has been used for encryption be
traced?
Answer Posted / vc
The question is a bit broad to answer definitively - there are many encryption methods (Certs, Shared-Secret, Symmetric Keys, etc) to begin with; Also it depends on other metrics: Whether the encrypted "Data is at Rest" OR "Data is in Motion" OR "Data is in Use". Once the question is crisply qualified answer follows obviously.
Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
What is decryption?
Blowfish uses the longest key. Does this mean it is the strongest cipher?
Is there a limit on the file size or on the number of encrypted files?
What is cryptographic synchronisation?
what are some of the current encryption schemes?
WHAT IS A SAMPLE USER INTERFACE OF DES ENCRYPTION/DECRYPTION PROJECT?
What is public-key cryptography ?
What is are "proprietary" and "public" cryptographic algorithms?
why hash functions are not used for encryption but authentication ?
How to I prevent other users from using Kryptel (Silver Key)?
How can we use quantum properties in cryptography ?
How to change the location of the Kryptel (Silver Key) program group?
What is exhaustive key search ?
What are knapsack cryptosystems?
what is trapdoor and how does it works?