Can the computer which has been used for encryption be
traced?
Answer Posted / vc
The question is a bit broad to answer definitively - there are many encryption methods (Certs, Shared-Secret, Symmetric Keys, etc) to begin with; Also it depends on other metrics: Whether the encrypted "Data is at Rest" OR "Data is in Motion" OR "Data is in Use". Once the question is crisply qualified answer follows obviously.
Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
What is secret-key cryptography ?
What is merkles tree signature scheme?
How to I prevent other users from using Kryptel (Silver Key)?
How do certifying authorities store their private keys ?
what are some of the current encryption schemes?
What is the mceliece cryptosystem?
why hash functions are not used for encryption but authentication ?
What are "stream" and "block" ciphers?
How is an s-box value of AES can be modified? How is it done?
What are the advantages of public-key cryptography compared with secret-key cryptography?
What is exhaustive key search ?
What are some other public key cryptosystems ?
What is decryption?
Actual role of cryptography is data security .Explain with real world example?
How to remove the Kryptel (Silver Key) icon from the desktop?