For two devices to communicate securely they must have a common key. Explore how keys can be shared and how communications can be encrypted and verified using digital signatures.