Can the computer which has been used for encryption be
traced?
Answer Posted / vc
The question is a bit broad to answer definitively - there are many encryption methods (Certs, Shared-Secret, Symmetric Keys, etc) to begin with; Also it depends on other metrics: Whether the encrypted "Data is at Rest" OR "Data is in Motion" OR "Data is in Use". Once the question is crisply qualified answer follows obviously.
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
How to I prevent other users from using Kryptel (Silver Key)?
What are the disadvantages of public-key cryptography compared with secret-key cryptography?
What are the ecb and cbc modes?
What are "stream" and "block" ciphers?
whats cryptanalysis?
What is multiple encryption?
What is luc?
What are the counter and pcbc modes?
Is there a limit on the file size or on the number of encrypted files?
What is public key encryption?
Does encryption of connection strings in web.config file possible? How?
What is the rabin signature scheme?
What is probabilistic encryption?
WHAT IS A SAMPLE USER INTERFACE OF DES ENCRYPTION/DECRYPTION PROJECT?
What is a zed encoder? How does it work?