Page 129 - CISSO_Prep_ Guide
P. 129
Bob uses the symmetric key to decrypt the message and the
attached digital signature.
Bob decrypts the digital signature with Alice's public key and
finds the hash of the message signed by Alice.
Bob creates a hash of the message he decrypted using the same
has an algorithm that Alice used.
Bob compares the hash value he created with the one sent and
signed by Alice. If the hash values are identical, then Bob knows
he has an authentic copy of the message from Alice.