Digital Signature with a Message Digest (make “nr” and “i”)
1. Bob writes a message and creates its message digest.
2. Bob encrypts the message digest with his private key. (He signs the message digest.)
3. Bob sends the message and the encrypted message digest to his associates. (This is for the comparison purpose.)
4. Bob’s associates calculate a new message digest of the received message.
5. The associates then decrypt the message digest (that Bob sent) using Bob’s public key.
6. Finally, they compare the message digest they’ve created with the one Bob sent. (They check for equivalence.)