This method of encryption give the sender and the receiver the right to set and agree on a shared key, that would
be used in encrypting and decrypting the message or data that is to be sent. Afterwards they use the shared key
they decided on to encrypt and decrypt their message, this is shown in Figure 2,