Consider the following example in which Person A needs to send a message to Person B, but there might be some issues in checking the authenticity of the sender:
- Authenticity: Person B should identify that the message is from Person A
- Secrecy: Others (Person C) should not sniff the message
The solution to this problem is using the encryption algorithms.