This involves the use of hash algorithms to create digital signatures, checksums, and message authentication codes.