Implementation process of signature:
Input: original text, private key
Output: signature value
1, hash the original.
2. Encrypt the hash with the private key, and the result is the signature value.
Implementation process of verifying signature:
Input: signature value, original text and public key.
Output: Verify whether it passed or not.
1, so that the original HASH 1.
2. Decrypt the signature value with the public key to obtain HASH2.
3. Compare the HASH 1 in step1with HASH2 in step 2. If the two hashes are the same, they pass the verification; otherwise, they fail the verification.