“Since SHA1 are hard to compute, we generate a RSA key pair with which we use to sign the message, then we decrypt the signature to find the SHA1.”