Explain how the customer’s and the company’s computers use a hashing algorithm to assure the customer that: the software has come from the company (is authentic) and no one has altered it.
Software is put through a hashing algorithm by company
Hash total is encrypted with company's private key
Company sends software and encrypted hash
Customer decrypts hash with public key of company
Customer uses hash algorithm to hash software
If hashes match unaltered else altered