This sounds very simple when represented like above. But the key difficulty is, how can we be certain that the encrypted info is browse thoroughly through the receiver? We want a way to Trade the keys securely. If our keys are uncovered, this protocol will turn into no better than basic HTTP.NIC is among the main and critical parts of associating a