Cross-stitch and Encryption
Made by Maggie Oates
Made by Maggie Oates
What if cross-stitch could help encryption? When encrypting messages, recipients need to validate that a sender is, in fact, the person they say they are. To do this, the sender gives the recipient a long number generated computationally, called a key fingerprint. Then, the recipient gets a message with a fingerprint and manually compares the message and sender fingerprints, a tedious task. But what if the sender could give the recipient a cross-stitch instead?
Created: February 17th, 2018
What if cross-stitch could help encryption?
When encrypting messages, recipients need to validate that a sender is, in fact, the person they say they are. To do this, the sender gives the recipient a long number generated computationally, called a key fingerprint. Then, the recipient gets a message with a fingerprint and manually compares the message and sender fingerprints, a tedious task.
But what if the sender could give the recipient a cross-stitch instead?