Statements (49)
Predicate | Object |
---|---|
gptkbp:instanceOf |
television channel
|
gptkbp:application |
Secure data transmission
|
gptkbp:basedOn |
Factoring large integers
|
gptkbp:commonName |
Authentication
Non-repudiation Data integrity Secure messaging Secure email Secure file transfer |
gptkbp:designedBy |
Rivest,_Shamir,_and_Adleman
|
gptkbp:developedBy |
gptkb:MIT
|
gptkbp:firstIntroduced |
1977
|
gptkbp:historicalSignificance |
Foundation for modern security protocols
Pioneered public-key cryptography |
https://www.w3.org/2000/01/rdf-schema#label |
Gore RSA
|
gptkbp:keyEvent |
Diffie-Hellman
|
gptkbp:keyIssues |
Public and private keys
2048 bits Key distribution Key revocation Key storage Random prime numbers |
gptkbp:notableEvent |
Asymmetric encryption
|
gptkbp:notableFeature |
RSA-1024
RSA-4096 RSA-2048 |
gptkbp:patentStatus |
Expired
|
gptkbp:paymentMethods |
Modular exponentiation
|
gptkbp:performance |
Slower than symmetric algorithms
|
gptkbp:relatedPatent |
gptkb:ISO/IEC_9796
X.509 PKCS#1 FIPS 186 |
gptkbp:relatedTo |
Digital_signatures
|
gptkbp:security |
High
Depends on key size Chosen ciphertext attacks Modular exponentiation Timing attacks Public_key_infrastructure_(PKI) Mathematical_attacks |
gptkbp:skills |
Quantum_computing_threats
|
gptkbp:standardFeatures |
NIST
|
gptkbp:usedFor |
Public-key cryptography
|
gptkbp:usedIn |
gptkb:SSL/TLS
VPNs Email encryption Secure web browsing Digital_certificates |