Can the computer which has been used for encryption be
traced?
Answer Posted / vc
The question is a bit broad to answer definitively - there are many encryption methods (Certs, Shared-Secret, Symmetric Keys, etc) to begin with; Also it depends on other metrics: Whether the encrypted "Data is at Rest" OR "Data is in Motion" OR "Data is in Use". Once the question is crisply qualified answer follows obviously.
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
What is meant by 1024, 2048, 5096 bit encryption?
Blowfish uses the longest key. Does this mean it is the strongest cipher?
What are the counter and pcbc modes?
why hash functions are not used for encryption but authentication ?
What information can be obtained from encrypted file?
whats cryptanalysis?
WHAT IS A SAMPLE USER INTERFACE OF DES ENCRYPTION/DECRYPTION PROJECT?
What is cryptographic synchronisation?
What is key management ?
what is pretty good privacy?
How to change the location of the Kryptel (Silver Key) program group?
Does encryption of connection strings in web.config file possible? How?
How to I prevent other users from using Kryptel (Silver Key)?
What are the ecb and cbc modes?
What is the Popular Symmetric-Key Encryption Method