Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Dallas
7 months agoTwana
7 months agoChandra
7 months agoJesusita
5 months agoEstrella
5 months agoPatti
6 months agoNieves
6 months agoMerissa
6 months agoGlenn
6 months agoMalcom
6 months agoSharmaine
6 months agoJerrod
7 months agoLeana
7 months agoCaitlin
6 months agoBrianne
6 months agoAleshia
6 months agoVivan
6 months agoStephaine
7 months agoQuiana
7 months agoJody
7 months agoWai
6 months agoLachelle
7 months agoHubert
7 months agoJaime
7 months agoMatthew
8 months agoLeatha
8 months ago