Describe two cryptographic applications and how they are used in Information System Security (IA9)

Describe two cryptographic applications and how they are used in Information System Security.

300 words