Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Viva
10 months agoKate
10 months agoCarylon
11 months agoGlory
11 months agoArdella
11 months agoShantay
11 months agoLatonia
11 months agoLinwood
12 months agoLouann
12 months agoRolande
1 years agoMary
11 months agoOrville
11 months agoKatlyn
11 months agoAshlyn
1 years ago