The difficulty of attacking__________is based on the difficulty of finding the prime factors of a composite number.
a) RSA security
b) Cryptographic algorithms
c) Public-key encryption
d) Modular arithmetic

Respuesta :

Answer:b) cryptographic algorithms

Step-by-step explanation: