Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.
Which of the following algorithms was employed by Peter in the above scenario?
Viva
6 months agoKate
6 months agoCarylon
7 months agoGlory
7 months agoArdella
7 months agoShantay
7 months agoLatonia
7 months agoLinwood
7 months agoLouann
8 months agoRolande
8 months agoMary
6 months agoOrville
7 months agoKatlyn
7 months agoAshlyn
8 months ago