Encryption requires the use of keys, plaintext or ciphertext, and algorithms. Since ciphertext can be obtained through sniffing and the algorithm can be obtained in most cases through research, the key is the only item keeping our data private. Secure key exchange is therefore very important. |