Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Viva
7 months agoKate
7 months agoCarylon
7 months agoGlory
8 months agoArdella
8 months agoShantay
8 months agoLatonia
8 months agoLinwood
8 months agoLouann
8 months agoRolande
9 months agoMary
7 months agoOrville
7 months agoKatlyn
8 months agoAshlyn
9 months ago