Can the computer which has been used for encryption be
traced?

Answer Posted / ankit

it could be traces by the public key of the computer...which
is used to decrypt

Is This Answer Correct ?    0 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Actual role of cryptography is data security .Explain with real world example?

1382


What are the advantages of public-key cryptography compared with secret-key cryptography?

459


How can we use quantum properties in cryptography ?

1313


What are "stream" and "block" ciphers?

1513


What is the mceliece cryptosystem?

477






What is the difference between Kryptel and Silver Key?

1685


What is nonlinear cryptography?

5847


How to remove the Kryptel (Silver Key) icon from the desktop?

1591


What are the counter and pcbc modes?

511


What is key management ?

1704


What is public key encryption?

1455


What is public-key cryptography ?

1459


Does encryption of connection strings in web.config file possible? How?

532


What is the Popular Symmetric-Key Encryption Method

496


How to I prevent other users from using Kryptel (Silver Key)?

1537