The receiver compares the hash they crank out from the sender's decrypted hash; whenever they match, the information or digital document has not been modified and the sender is authenticated.
Our tipster preferred to https://lilywfpe324274.blog5.net/70821890/everything-about-digital-signature-certificate