The signer makes a hash of the original message
The signer use the private key to encrypt the hash (faster) to create a signature
The verifier obtain and use the public key to decrypt the signature
The verifier compare the decrypt signature hash value with the one created by hashing the message and make sure they are the same