Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Dallas
4 months agoTwana
5 months agoChandra
5 months agoJesusita
3 months agoEstrella
3 months agoPatti
3 months agoNieves
3 months agoMerissa
4 months agoGlenn
4 months agoMalcom
4 months agoSharmaine
4 months agoJerrod
4 months agoLeana
5 months agoCaitlin
4 months agoBrianne
4 months agoAleshia
4 months agoVivan
4 months agoStephaine
5 months agoQuiana
5 months agoJody
5 months agoWai
4 months agoLachelle
4 months agoHubert
4 months agoJaime
5 months agoMatthew
5 months agoLeatha
5 months ago