Describe two cryptographic applications and how they are used in Information System Security (IA9) Describe two cryptographic applications and how they are used in Information System Security. 300 words