Introduction - If you have any usage issues, please Google them yourself
To use a public key system to digitally sign the message, the sender applies the hash function to the message to create a message digest. The sender then encrypts the message digest with its own private key to create the sender's signature. After I receive my message and signature, the receiver using the sender's public key to decrypt the signature, to restore the message digest, and use the same hash algorithm used by the sender of the message in the hash algorithm. If the message digest calculated by the receiver is fully matched with the message digest received from the sender, the receiver can assume that the message has not been changed in the transmission. Please note that since the sender's public key is public knowledge, anyone can verify the signature.
Packet : 5956456rsa.rar filelist
RSA.txt