Can the computer which has been used for encryption be
traced?
Answer Posted / ankit
it could be traces by the public key of the computer...which
is used to decrypt
Is This Answer Correct ? | 0 Yes | 1 No |
Post New Answer View All Answers
Actual role of cryptography is data security .Explain with real world example?
What are the advantages of public-key cryptography compared with secret-key cryptography?
How can we use quantum properties in cryptography ?
What are "stream" and "block" ciphers?
What is the mceliece cryptosystem?
What is the difference between Kryptel and Silver Key?
What is nonlinear cryptography?
How to remove the Kryptel (Silver Key) icon from the desktop?
What are the counter and pcbc modes?
What is key management ?
What is public key encryption?
What is public-key cryptography ?
Does encryption of connection strings in web.config file possible? How?
What is the Popular Symmetric-Key Encryption Method
How to I prevent other users from using Kryptel (Silver Key)?