This sounds basic when represented like previously mentioned. But the most crucial problem is, how do we make sure that the encrypted data is study appropriately from the receiver? We want a method to exchange the keys securely. If our keys are uncovered, this protocol will turn out to be no a lot better than uncomplicated HTTP.There won't be any H