Encryption – Part 4 – Secure Connections
In the last several posts we discussed the use of a key to encrypt messages. When both parties have the same keys, these are referred to as "symmetric". Current technology uses symmetric keys for most secure interactions, but we have a problem with getting the key to the computer/person we want to talk to. In [...]