Public-key and private-key algorithms can also be used to form
digital signatures. Digital signatures authenticate the identity
of a sender (if you trust the sender's public key) and protect
the integrity of data. You may also hear the term MAC (Message
Authentication Code).