This Seems uncomplicated when represented like earlier mentioned. But the most crucial difficulty is, how do we ensure that the encrypted details is browse appropriately with the receiver? We'd like a way to exchange the keys securely. If our keys are exposed, this protocol will turn into no better than basic HTTP.Public Key: Accessible to any one