This document describes the pattern for digital signatures using hashing. A digital signature allows a principal to prove that a message was originated from them and verifies that the message has not been altered. It works by hashing the message to a fixed length digest, then encrypting the digest with the sender's private key. When received, the signature can be validated by decrypting with the public key and comparing hashes to ensure the message was not modified. Digital signatures provide message authentication, integrity, and non-repudiation of origin.