Step 2 The employee clicks a button to attach and submit the company's bid. Behind the scenes, the encryption software performs the following actions
(a) Uses a hashing algorithm, such as MD5, to create a hash of the bid.
(b) Encrypts the hash using Northwest Industries's private key. This creates a digital signature for the bid.