This Seems uncomplicated when represented like earlier mentioned. But the most crucial difficulty is, how do we make certain that the encrypted data is go through correctly from the receiver? We want a way to exchange the keys securely. If our keys are uncovered, this protocol will turn out to be no better than easy HTTP.Alice's browser utilizes th