1) Encryption algorithms are used to encrypt messages sent over networks to protect the confidentiality of the data. 2) Authentication ensures the identity of the sender by verifying they are who they claim to be. Digital signatures are used for this by hashing messages. 3) Digital certificates bind public keys to identities, allowing messages signed with private keys to be verified and decrypted using the public keys. This validates messages were not forged.