This sounds basic when represented like above. But the leading problem is, how can we make sure the encrypted information is read through properly with the receiver? We want a way to Trade the keys securely. If our keys are uncovered, this protocol will develop into no better than uncomplicated HTTP.Alice's browser utilizes the server's public esse