Companies are increasingly using online methods to manage their business. They need reliable ways to verify the authenticity and integrity of these electronic items. More specifically, they must ensure that they haven't been altered maliciously since creation.