Without seeing your relevant code fragment, it is difficult to say.
However, it is neither necessary nor desirable to store a RSA encrypted password. If you do, then every password has to be encrypted with a known key, which must be provided to the code in order to decrypt it each time you need to check it.
Instead, use a MD5 or SHA hash of the password (preferably SHA, since MD5 is officially classed as "broken"). Since hashes are not reversible you cannot get back to the password from the stored value and it requires no key at all to generate.
To check the password, generate the hash from what the user input, and compare the two hash values. If they are the same, the passwords match.
It is a good practice to include the Username or ID in with the password before you generate the hash, this prevents two users with the same password from generating identical hash values.
"Why I use RSA encrypted password is that I store the private key and the public key is included in the code. If users forget the password then he can send the encrypted value to me and I can use the private key to decrypt it and send it back to the user.
The problem now I have is that the RSA encryption method generate different encrypted values each time even using the same public key."
Not a good idea: nobody should have access to passwords, not even you.
If the user forgets the password, then you could
1) Send him a hint, as several sites do, based on text he entered when he registered.
2) Reset the password to a random value, and email it to him on his registered address.
If you do it your way, then you are sending a password, in clear, to someone who you do not necessarily know is the original user. Major security breach! Picture the scene:
You sign up for your site.
You go off for a meeting.
I use your PC to request my password from your site, claiming I forgot it.
Your site sends it to me.
I delete the email and walk away.
Now, I have your password, and you don't know anything has happened.
And since many, many people use the same password for everything because they can't remember multiple ones, I now have access to your bank as well... And you still don't know it's gone - lucky me!
No-one, even trusted people like you, should have access to passwords at all. Hash them: it's simple, quick, and efficient. It uses a fixed space in the database, and it's a lot more secure.
public byte[] SHA2Hash(string s)
{
SHA512 shaM = new SHA512Managed();
byte[] bs = Encoding.UTF8.GetBytes(s);
return shaM.ComputeHash(bs);
}