This Seems uncomplicated when represented like earlier mentioned. But the primary concern is, how do we be certain that the encrypted data is study effectively because of the receiver? We'd like a way to Trade the keys securely. If our keys are uncovered, this protocol will become no better than basic HTTP.Network devices are Actual physical gadget