This Appears easy when represented like above. But the primary situation is, how can we be sure that the encrypted knowledge is read effectively from the receiver? We need a method to exchange the keys securely. If our keys are exposed, this protocol will become no better than simple HTTP.Insecure. After you deliver HTTP requests They may be despat