There’s a server, a client, and a hacker in a network. For encryption, the client and the server need to share their private keys. Wouldn’t the hacker be able to grab those during their transmission and decrypt further messages as they please?
Oh, I may actually have confused that. Thanks for pointing it out.
Confidentiality Integrity Availability
Oh, I may actually have confused that. Thanks for pointing it out.