This refers to the use of hash algorithms for security purposes, such as password storage and verification.