Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Viva
5 months agoKate
5 months agoCarylon
6 months agoGlory
6 months agoArdella
6 months agoShantay
6 months agoLatonia
6 months agoLinwood
6 months agoLouann
7 months agoRolande
7 months agoMary
5 months agoOrville
6 months agoKatlyn
6 months agoAshlyn
7 months ago