This Appears simple when represented like over. But the key concern is, how can we ensure that the encrypted data is read adequately through the receiver? We'd like a method to exchange the keys securely. If our keys are uncovered, this protocol will turn out to be no better than straightforward HTTP.Community Critical: Accessible to anyone connect