Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Viva
1 years agoKate
1 years agoCarylon
1 years agoGlory
1 years agoArdella
1 years agoShantay
1 years agoLatonia
1 years agoLinwood
1 years agoLouann
1 years agoRolande
1 years agoMary
1 years agoOrville
1 years agoKatlyn
1 years agoAshlyn
1 years ago