What is the primary function of a hashing algorithm within the realm of cybersecurity?
To encrypt data so that it can be securely transmitted over public networks
To generate a unique 'fingerprint' of data that can be used to verify its integrity
To compress data to save storage space before transmitting over a network
To serve as the public key within a public-private key pair used for asymmetric encryption