Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Viva
10 months agoKate
10 months agoCarylon
10 months agoGlory
10 months agoArdella
11 months agoShantay
11 months agoLatonia
11 months agoLinwood
11 months agoLouann
11 months agoRolande
12 months agoMary
10 months agoOrville
10 months agoKatlyn
10 months agoAshlyn
12 months ago