Discussion 300 Words by admin Describe two cryptographic applications and how they are used in Information System Security.