This Seems easy when represented like above. But the leading challenge is, how do we ensure that the encrypted details is browse effectively by the receiver? We need a method to exchange the keys securely. If our keys are uncovered, this protocol will grow to be no better than uncomplicated HTTP.HTTP could be the avenue through which information is