Before the introduction of public-key cryptography by Diffie and Hellman, if two people wanted to communicate in private by encrypting messages, they first would need to meet in person and agree on what method to encrypt their messages. You can imagine how hard it would be to change a method once it is in place […]