5. Authentication is useful for proving that a message has not been modified during transmission. The message-authentication code and the digital-signature algorithm are two popular authentication solutions. Please explain how they operate.