Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Viva
10 months agoKate
11 months agoCarylon
11 months agoGlory
11 months agoArdella
11 months agoShantay
12 months agoLatonia
12 months agoLinwood
12 months agoLouann
1 years agoRolande
1 years agoMary
11 months agoOrville
11 months agoKatlyn
11 months agoAshlyn
1 years ago