You are concerned that a message may have been intercepted and retransmitted, thus compromising the security of the communications. You attach a code to the electronically transmitted message that uniquely identifies the sender. This code is known as a:
A.
Digital signature
B.
Tag
C.
Private key
D.
AES flag
E.
Diffie-Helman verification
Wonderful thoughts