Introduction - If you have any usage issues, please Google them yourself
Sender s private key encrypted communications with their own content generated digital signature the sender, and send it to the receiving party the receiving party using the sender s public key to verify the contents of the signature
Consideration:
(1) whether there are security issues in this way?
(2) Please select the file test-1.txt respectively and test_pig.bmp as communications content, the whole process were recorded with a time and compare