What this tool is good for
RSA signing and verification provide authenticity, integrity, and non-repudiation. A private key creates the signature, and the matching public key verifies it.
This page is useful when debugging API signatures, validating interoperability between systems, or checking whether a PEM key pair is wired correctly.
How signing and verification work
- Signing hashes the input content and signs the digest with a private key.
- Verification hashes the same content again and compares it with the digest recovered from the signature using the public key.
- If the two digests match, the signature is valid and the content has not been changed.
Practical notes
- Encrypted private keys require the correct password before signing can proceed.
- The digest algorithm must match on both the signing side and the verification side.
- Signatures on this page are encoded as Base64 for easier transport and comparison.
Related tools
- RSA Encryption & Decryption:Encrypt and decrypt short text with RSA in your browser
- RSA Key Pair Generator:Generate RSA public and private key pairs in PEM format