This lesson covers digital signatures, MACs and hashes. With a digital signature, the hash is encrypted with the sender's private key. The Recipient is able to decrypt is with the sender's public key. If the hashes match, we know the message has not been modified. This lesson also covers Message Authentication Code (MACs) which provide integrity and some reasonable authenticity.