A software company wants to ensure that files downloaded by users have not been tampered with. They decide to publish a cryptographic value alongside each file, allowing users to verify the integrity of the downloaded file. What method is the company employing?
Encryption
Hashing
Obfuscation
Steganography