1) The sender applies a hash algorithm to the data and generates a hash value.
2) The sender uses the private key to convert the hash value into a digital signature.
3) The sender sends the data, signature and sender's certificate to the receiver.
4) The receiver applies the hash algorithm to the received data and generates a hash value.
5) The receiver uses the sender's public key and the newly generated hash value to verify the signature.
References:
Web page link