Public key cryptography and RSA encryption algorithm

Let say if Alice would like to send a secret message to Bob, she may want to first encrypt the message before sending it. Modern cryptographic techniques all use some secret keys to encrypt and decrypt a message. For example, we may generate a random sequence with a predefined seed (the key) and take the…

apt update fail after installing Jetson library on host computer

As title, the issue is “fixed” by adding  [arch=amd64,i386] just after deb on every deb line in /etc/apt/source.list as suggested here. However, note that some deb lines may be included under the folder /etc/apt/source.list.d. So don’t forget adding [arch=amd64,i386] to them also. Another fix mentioned here is to remove the arm64 architecture completely. sudo dpkg –force-architecture –remove-architecture arm64 It did…