Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Dallas
3 months agoTwana
4 months agoChandra
4 months agoJesusita
2 months agoEstrella
2 months agoPatti
2 months agoNieves
2 months agoMerissa
2 months agoGlenn
3 months agoMalcom
3 months agoSharmaine
3 months agoJerrod
3 months agoLeana
4 months agoCaitlin
3 months agoBrianne
3 months agoAleshia
3 months agoVivan
3 months agoStephaine
4 months agoQuiana
4 months agoJody
4 months agoWai
3 months agoLachelle
3 months agoHubert
3 months agoJaime
4 months agoMatthew
4 months agoLeatha
4 months ago