Can the computer which has been used for encryption be
traced?
Answers were Sorted based on User's Feedback
Answer / vc
The question is a bit broad to answer definitively - there are many encryption methods (Certs, Shared-Secret, Symmetric Keys, etc) to begin with; Also it depends on other metrics: Whether the encrypted "Data is at Rest" OR "Data is in Motion" OR "Data is in Use". Once the question is crisply qualified answer follows obviously.
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / ankit
it could be traces by the public key of the computer...which
is used to decrypt
| Is This Answer Correct ? | 0 Yes | 1 No |
What is the difference between a message authentication code (MAC) and a one-way hash?
What is an encryption "key" and what is the importance of key length?
why hash functions are not used for encryption but authentication ?
What is Ciphertext?
Does encryption of connection strings in web.config file possible? How?
Do digital signatures help detect altered documents and transmission errors?
WHAT IS A SAMPLE USER INTERFACE OF DES ENCRYPTION/DECRYPTION PROJECT?
What is cryptographic synchronisation?
Can the computer which has been used for encryption be traced?
What is an algorithm?
Actual role of cryptography is data security .Explain with real world example?
What key size should be used ?