Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Can the computer which has been used for encryption be
traced?

Answer Posted / vc

The question is a bit broad to answer definitively - there are many encryption methods (Certs, Shared-Secret, Symmetric Keys, etc) to begin with; Also it depends on other metrics: Whether the encrypted "Data is at Rest" OR "Data is in Motion" OR "Data is in Use". Once the question is crisply qualified answer follows obviously.

Is This Answer Correct ?    4 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is meant by 1024, 2048, 5096 bit encryption?

3676


Blowfish uses the longest key. Does this mean it is the strongest cipher?

2325


What are the counter and pcbc modes?

963


why hash functions are not used for encryption but authentication ?

1910


What information can be obtained from encrypted file?

2019


whats cryptanalysis?

2117


WHAT IS A SAMPLE USER INTERFACE OF DES ENCRYPTION/DECRYPTION PROJECT?

2476


What is cryptographic synchronisation?

2198


What is key management ?

2146


what is pretty good privacy?

1926


How to change the location of the Kryptel (Silver Key) program group?

2040


Does encryption of connection strings in web.config file possible? How?

971


How to I prevent other users from using Kryptel (Silver Key)?

1947


What are the ecb and cbc modes?

979


What is the Popular Symmetric-Key Encryption Method

941