Is it necessary for the recipient to be using the same encryption software as the sender in order to be able to decrypt and read digital signatures, or is it necessary merely to check that the recipient has software that supports the same encryption algorithm as the sender is using?