Can the computer which has been used for encryption be
traced?
Answer Posted / sreenath
No, nothing is saved that permits tracing.
| Is This Answer Correct ? | 2 Yes | 6 No |
Post New Answer View All Answers
What are some other public key cryptosystems ?
why hash functions are not used for encryption but authentication ?
Do encrypted files contain password in some form?
Is there a limit on the file size or on the number of encrypted files?
What are "stream" and "block" ciphers?
What is public key encryption?
What is public-key cryptography ?
What information can be obtained from encrypted file?
How to remove the Kryptel (Silver Key) icon from the desktop?
What is exhaustive key search ?
How Encoding is different from Encryption?
What is meant by 1024, 2048, 5096 bit encryption?
What is are "proprietary" and "public" cryptographic algorithms?
what are some of the current encryption schemes?
What is a zed encoder? How does it work?