When evaluating the integrity of a system's files, a cybersecurity analyst might use a mathematical algorithm to generate a unique string of characters for each file. What is the term for this string of characters?
Cipher text
Cryptographic key
Hash
Digital signature