Can the computer which has been used for encryption be
traced?

Answer Posted / vc

The question is a bit broad to answer definitively - there are many encryption methods (Certs, Shared-Secret, Symmetric Keys, etc) to begin with; Also it depends on other metrics: Whether the encrypted "Data is at Rest" OR "Data is in Motion" OR "Data is in Use". Once the question is crisply qualified answer follows obviously.

Is This Answer Correct ?    4 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is secret-key cryptography ?

3578


What is merkles tree signature scheme?

494


How to I prevent other users from using Kryptel (Silver Key)?

1542


How do certifying authorities store their private keys ?

1993


what are some of the current encryption schemes?

2602






What is the mceliece cryptosystem?

477


why hash functions are not used for encryption but authentication ?

1376


What are "stream" and "block" ciphers?

1513


How is an s-box value of AES can be modified? How is it done?

1391


What are the advantages of public-key cryptography compared with secret-key cryptography?

459


What is exhaustive key search ?

1699


What are some other public key cryptosystems ?

1620


What is decryption?

505


Actual role of cryptography is data security .Explain with real world example?

1382


How to remove the Kryptel (Silver Key) icon from the desktop?

1593