Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Dallas
5 months agoTwana
6 months agoChandra
6 months agoJesusita
4 months agoEstrella
4 months agoPatti
4 months agoNieves
4 months agoMerissa
5 months agoGlenn
5 months agoMalcom
5 months agoSharmaine
5 months agoJerrod
5 months agoLeana
6 months agoCaitlin
5 months agoBrianne
5 months agoAleshia
5 months agoVivan
5 months agoStephaine
6 months agoQuiana
6 months agoJody
6 months agoWai
5 months agoLachelle
5 months agoHubert
6 months agoJaime
6 months agoMatthew
6 months agoLeatha
6 months ago