Log in
Enquire now
RSA

RSA

Algorithm for public-key cryptography

OverviewStructured DataIssuesContributors

Contents

Is a
Technology
Technology

Technology attributes

Created/Discovered by
Adi Shamir (Executive)
Adi Shamir (Executive)
‌
Ronald Linn Rivest
Leonard Adleman
Leonard Adleman
Related Industries
Cybersecurity
Cybersecurity
‌
Cryptography Research
Date Invented
1977

Other attributes

Also Known As
Asymmetric cryptography
Public-key cryptography
Rivest–Shamir–Adleman
Creator
Adi Shamir
Adi Shamir
Founded Date
January 1, 1977
Named After
Adi Shamir (Executive)
Adi Shamir (Executive)
Ron Rivest
Ron Rivest
Leonard Adleman
Leonard Adleman
Wikidata ID
Q181551

RSA type of public-key cryptography widely used for data encryption of e-mail and other digital transactions over the Internet. RSA is named for its inventors, Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman, who created it while on the faculty at the Massachusetts Institute of Technology.

Introduced at the time when the era of electronic email was expected to soon arise, RSA implemented two important ideas:

1. Public-key encryption. This idea omits the need for a “courier” to deliver keys to recipients over another secure channel before transmitting the originally-intended message. In RSA, encryption keys are public, while the decryption keys are not, so only the person with the correct decryption key can decipher an encrypted message. Everyone has their own encryption and decryption keys. The keys must be made in such a way that the decryption key may not be easily deduced from the public encryption key.

2. Digital signatures. The receiver may need to verify that a transmitted message actually originated from the sender (signature), and didn’t just come from there (authentication). This is done using the sender’s decryption key, and the signature can later be verified by anyone, using the corresponding public encryption key. Signatures therefore cannot be forged. Also, no signer can later deny having signed the message.

This is not only useful for electronic mail, but for other electronic transactions and transmissions, such has fund transfers. The security of the RSA algorithm has so far been validated, since no known attempts to break it have yet been successful, mostly due to the difficulty of factoring large numbers n = pq, where p and q are large prime numbers.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date

Explainer: What is post-quantum cryptography?

Martin Giles

https://www.technologyreview.com/2019/07/12/134211/explainer-what-is-post-quantum-cryptography/

Web

July 12, 2019

Public Key Cryptography: RSA Encryption Algorithm

https://www.youtube.com/watch?v=wXB-V_Keiu8

Web

July 30, 2012

RSA algorithm step by step example

https://www.youtube.com/watch?v=j2NBya6ADSY

Web

September 3, 2020

RSA Cryptosystem

https://math.asu.edu/sites/default/files/rsa_0.pdf

RSA encryption in 5 minutes

https://www.youtube.com/watch?v=sBO3gH1uGzQ

Web

June 30, 2016

References

Find more entities like RSA

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.