. . . . "These endpoints are representative of individual computer systems such as personal computers, web servers or other computer systems that need to privately exchange cryptographic key data." .