Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Dallas
8 months agoTwana
8 months agoChandra
8 months agoJesusita
7 months agoEstrella
7 months agoPatti
7 months agoNieves
7 months agoMerissa
7 months agoGlenn
7 months agoMalcom
7 months agoSharmaine
8 months agoJerrod
8 months agoLeana
8 months agoCaitlin
7 months agoBrianne
7 months agoAleshia
8 months agoVivan
8 months agoStephaine
8 months agoQuiana
8 months agoJody
9 months agoWai
7 months agoLachelle
8 months agoHubert
8 months agoJaime
8 months agoMatthew
9 months agoLeatha
9 months ago