This sounds straightforward when represented like earlier mentioned. But the main concern is, how do we be certain that the encrypted details is browse appropriately from the receiver? We need a method to Trade the keys securely. If our keys are uncovered, this protocol will develop into no much better than easy HTTP.Community Critical: Available t