User talk:Bhale2/sandbox/draft

Maybe elaborate more on how a two people can view a symmetric key because they both have a code that decrypts the information that is being sent. It's just a little vague on how the two parties can see the information and others can't. I also really like that you include an example in history of the Nazi's, it makes the understanding of the key's more interesting.

Paul Shin
The article contain very good information and reliable sources. However, "they need to protect it-and they use a Symmetric Key when they want to be able to have only the two parties relay this information", this part it is kind of unclear what "this", "this", and "they" are referring to Eui135 (talk) 12:46, 1 November 2018 (UTC)

Michael Zanni
Try and provide an example for private keys like you did symmetric keys. Also, implement other types of keys, if there are any. If there aren't any others. Expand on what private and symmetric keys can do in present day products. Michaelazanni (talk) 20:59, 7 November 2018 (UTC)Michaelazanni