I've often wondered how 2 computers that want to communicate securely over an insecure medium are able to establish a secret key. It seems like whatever information is passed from one computer to another regarding how to encrypt messages (which alogrithm to use, what prime number to factor, etc) could be intercepted and acted upon by a 3rd party just as easily as the intended party.
Can anyone elaborate?
Can anyone elaborate?