Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Can the computer which has been used for encryption be
traced?

Answer Posted / vc

The question is a bit broad to answer definitively - there are many encryption methods (Certs, Shared-Secret, Symmetric Keys, etc) to begin with; Also it depends on other metrics: Whether the encrypted "Data is at Rest" OR "Data is in Motion" OR "Data is in Use". Once the question is crisply qualified answer follows obviously.

Is This Answer Correct ?    4 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

How to I prevent other users from using Kryptel (Silver Key)?

1864


What are the disadvantages of public-key cryptography compared with secret-key cryptography?

772


What are the ecb and cbc modes?

885


What are "stream" and "block" ciphers?

1909


whats cryptanalysis?

2033


What is multiple encryption?

862


What is luc?

801


What are the counter and pcbc modes?

888


Is there a limit on the file size or on the number of encrypted files?

1875


What is public key encryption?

1882


Does encryption of connection strings in web.config file possible? How?

885


What is the rabin signature scheme?

820


What is probabilistic encryption?

858


WHAT IS A SAMPLE USER INTERFACE OF DES ENCRYPTION/DECRYPTION PROJECT?

2332


What is a zed encoder? How does it work?

2645