Cryptographic signatures typically involve a pair of keys: a public key and a private key. The sender uses the private key to create a digital signature, which is then attached to the email. The recipient uses the public key to verify the signature. If the verification succeeds, it confirms the authenticity of the email and that it has not been altered.