Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Viva
12 months agoKate
1 years agoCarylon
1 years agoGlory
1 years agoArdella
1 years agoShantay
1 years agoLatonia
1 years agoLinwood
1 years agoLouann
1 years agoRolande
1 years agoMary
1 years agoOrville
1 years agoKatlyn
1 years agoAshlyn
1 years ago