Generate cryptographic hashes using SHA-256, SHA-384, or SHA-512. Verify file integrity and create secure checksums.