### 5.4.3 Evaluating a signature

The process of evaluating the signature on a received RIN message is as follows:

The receiving RIN processor opens the RIN message and removes the signature composite from the

`MessageHeader`

;The RIN processor shall then decrypt the signature element of the signature composite using the public key of the party that signed the RIN message, using the algorithm indicated in the signature composite of the

`MessageHeader`

;The RIN processor shall then generate a hash sum of the RIN message without the signature composite from the

`MessageHeader`

, using the algorithm indicated in the signature composite of the`MessageHeader`

;The receiving RIN processor shall then compare the decrypted signature with the calculated hash sum:

If the signatures are the same, the party claiming to be the generator of the RIN message can be deemed to be so; and

If the signatures are not the same, the party claiming to be the generator of the RIN message cannot be deemed to be so.