Hi George,
What are you worrying about?
1. Alice signs a message with her private key.
2. Bob gets this message and wants to verify the author:
He got Alice' public key and can now calculate whether the message
was modified or not.
diagram snippet of an older lecture of mine:
o-----------------------------------------------> Alg. --> msg
| A
pubkey | pubkey
|
A msg --> Alg. --> msg sig+ --> transport --> msg sig+ --> msg B
A
seckey -passw-' seckey
--
Yours Sincerely
Kai Burghardt