Conventional encryption; public-key encryption; authentication and digital signatures; key management; intruders, viruses, and worms; electronic mail security, and authentication applications.