This Appears uncomplicated when represented like previously mentioned. But the primary challenge is, how do we be certain that the encrypted facts is examine properly with the receiver? We'd like a means to exchange the keys securely. If our keys are exposed, this protocol will become no much better than basic HTTP.Variable Length Subnet Mask (VLSM