We need some schemes or methods to uniquely identify anything. Just following this, in cryptography to identify unique records we work with these identification schemes. All of us would want that the message for example, that we are sending to our Friend Tom Mitchell should go to that specific Tom Mitchell only.