Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Samira
4 months agoBrittni
5 months agoVenita
5 months agoMalcolm
5 months agoShaun
5 months agoCatina
6 months agoKatina
6 months agoAlyssa
6 months agoPeggie
6 months agoThurman
6 months agoDaren
6 months agoElke
6 months agoLetha
6 months agoCordelia
6 months agoMarica
6 months agoDaisy
6 months agoTitus
6 months agoViva
2 years agoKate
2 years agoCarylon
2 years agoGlory
2 years agoArdella
2 years agoShantay
2 years agoLatonia
2 years agoLinwood
2 years agoLouann
2 years agoRolande
2 years agoMary
2 years agoOrville
2 years agoKatlyn
2 years agoAshlyn
2 years ago