>
Bolivia's New President Backs Blockchain To Tackle Government Corruption
The "Triumph Of Big Government" Created The Current Sovereign Debt Crisis
Musk Responds After SpaceX Loses Guarantee Of First Moon Landing
US Strikes 8th Alleged Drug Boat, For First Time In Pacific Waters
Future of Satellite of Direct to Cellphone
Amazon goes nuclear with new modular reactor plant
China Is Making 800-Mile EV Batteries. Here's Why America Can't Have Them
China Innovates: Transforming Sand into Paper
Millions Of America's Teens Are Being Seduced By AI Chatbots
Transhumanist Scientists Create Embryos From Skin Cells And Sperm
You've Never Seen Tech Like This
Sodium-ion battery breakthrough: CATL's latest innovation allows for 300 mile EVs
Defending Against Strained Grids, Army To Power US Bases With Micro-Nuke Reactors
Two basic types of encryption schemes are used on the internet today. One, known as symmetric-key cryptography, follows the same pattern that people have been using to send secret messages for thousands of years. If Alice wants to send Bob a secret message, they start by getting together somewhere they can't be overheard and agree on a secret key; later, when they are separated, they can use this key to send messages that Eve the eavesdropper can't understand even if she overhears them. This is the sort of encryption used when you set up an online account with your neighborhood bank; you and your bank already know private information about each other, and use that information to set up a secret password to protect your messages.
The second scheme is called public-key cryptography, and it was invented only in the 1970s. As the name suggests, these are systems where Alice and Bob agree on their key, or part of it, by exchanging only public information.