Can the computer which has been used for encryption be
traced?
Answers were Sorted based on User's Feedback
Answer / vc
The question is a bit broad to answer definitively - there are many encryption methods (Certs, Shared-Secret, Symmetric Keys, etc) to begin with; Also it depends on other metrics: Whether the encrypted "Data is at Rest" OR "Data is in Motion" OR "Data is in Use". Once the question is crisply qualified answer follows obviously.
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / ankit
it could be traces by the public key of the computer...which
is used to decrypt
| Is This Answer Correct ? | 0 Yes | 1 No |
What is multiple encryption?
What information can be obtained from encrypted file?
How to change the encrypted file icon?
What is Plaintext?
How can we use quantum properties in cryptography ?
What are the counter and pcbc modes?
What is an encryption "key" and what is the importance of key length?
How do certifying authorities store their private keys ?
What is the difference between Kryptel and Silver Key?
What is are "proprietary" and "public" cryptographic algorithms?
what are some of the current encryption schemes?
Hello. In Snort, how a digital signature is actually created for the authentication purpose and thereby provides intrusion detection as well as prevention. How the software for IDS/IPS comes to know regarding the threat/vulnerability using digital signature ? Whether any specific language or programming is used or not.