When a message is sent from a sender to a receiver, how does the receiver know if the message is not tampered with in the process?
One simple answer is to include the Hash Value with the Message. However, an Attacker can modify the Hash Value along with the Message itself. This is demonstrated in the following diagram: