This sounds simple when represented like earlier mentioned. But the key problem is, how do we make sure that the encrypted data is examine correctly through the receiver? We want a method to exchange the keys securely. If our keys are exposed, this protocol will become no a lot better than straightforward HTTP.Insecure. If you send HTTP requests Th