• Mention that keys can also be used for other applications, not just encryption, e.g. MACs and digital signatures.