Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Samira
3 months agoBrittni
3 months agoVenita
3 months agoMalcolm
4 months agoShaun
4 months agoCatina
4 months agoKatina
4 months agoAlyssa
4 months agoPeggie
5 months agoThurman
5 months agoDaren
5 months agoElke
5 months agoLetha
5 months agoCordelia
5 months agoMarica
5 months agoDaisy
5 months agoTitus
5 months agoViva
2 years agoKate
2 years agoCarylon
2 years agoGlory
2 years agoArdella
2 years agoShantay
2 years agoLatonia
2 years agoLinwood
2 years agoLouann
2 years agoRolande
2 years agoMary
2 years agoOrville
2 years agoKatlyn
2 years agoAshlyn
2 years ago