This Seems simple when represented like earlier mentioned. But the leading situation is, how do we ensure that the encrypted facts is browse adequately via the receiver? We need a way to exchange the keys securely. If our keys are uncovered, this protocol will come to be no better than straightforward HTTP.HTTPS connections are encrypted via SSL/TL