Introduction - If you have any usage issues, please Google them yourself
Practical steps digital signature
( A ) the sender uses the MD5 algorithm to calculate the content of communications , access to a fixed-length message digest
( 2 ) the sender s private key encryption with their own information generated by the sender generates a digital signature , the digital signature of the sender of the message as an attachment and send plaintext , together with the recipient s public key to encrypt the encrypted sent along with the ciphertext to the recipient
( 3 ) First, the recipient receives the ciphertext with his private key to decrypt , get the plaintext and the digital signature , then the sender s public key to decrypt the digital signature , and then using the same one-way hash algorithm to calculate decrypted plaintext information, to receive message digest comparing the calculated message digest and the information sent from the sender summary is consistent
Reflections :
( 1 ) Please select the file test-1.txt respectively and test_pictur