RSA Cryptography

GPTKB entity

Statements (94)
Predicate Object
gptkbp:instance_of gptkb:crypt
gptkbp:based_on Factorization of large integers
factorization of large integers
gptkbp:benefits Computationally intensive
No need to share private keys
gptkbp:decryption_process uses private key for decryption
Ciphertext to plaintext
gptkbp:developed_by gptkb:Adi_Shamir
gptkb:Ron_Rivest
gptkb:Leonard_Adleman
gptkbp:first_introduced gptkb:1977
gptkbp:first_published gptkb:Communications_of_the_ACM
gptkbp:has_programs gptkb:crypt
Encryption algorithm
Decryption algorithm
signature algorithm
https://www.w3.org/2000/01/rdf-schema#label RSA Cryptography
gptkbp:invention gptkb:Adi_Shamir
gptkb:Ron_Rivest
gptkb:1977
gptkb:Leonard_Adleman
patented until 2000
gptkbp:is_implemented_in Various programming languages
various programming languages
gptkbp:is_often_accompanied_by symmetric encryption
gptkbp:is_standardized_by gptkb:NIST
gptkb:PKCS#1
gptkbp:is_vulnerable_to Quantum computing threats
chosen ciphertext attacks
timing attacks
quantum computing attacks
Key length concerns
gptkbp:key commonly 2048 bits
commonly 4096 bits
Typically 2048 bits or more
gptkbp:key_exchange gptkb:Diffie-Hellman_key_exchange
gptkbp:key_feature Public key infrastructure (PKI)
Certificate authorities (CAs)
gptkbp:key_generation Public key and private key
involves two large prime numbers
involves modulus calculation
involves public and private exponent calculation
gptkbp:notable_applications gptkb:PGP
gptkb:SSH
gptkb:HTTPS
secure messaging
digital certificates
gptkbp:performance Slower than symmetric key algorithms
gptkbp:provides Authentication
Integrity
Confidentiality
confidentiality
data integrity
authentication
key exchange mechanism
gptkbp:related_to gptkb:crypt
gptkb:Elliptic_curve_cryptography
gptkb:Mathematics
Computer science
Symmetric key cryptography
gptkbp:requires gptkb:random_number_generation
secure key storage
Two prime numbers
gptkbp:security uses public key for encryption
difficulty of factoring large primes
Difficulty of factoring large numbers
Plaintext to ciphertext
gptkbp:suitable_for large data encryption
gptkbp:used_by SSH (Secure Shell)
SSL/ TLS protocols
PGP (Pretty Good Privacy)
gptkbp:used_in gptkb:blockchain_technology
gptkb:SSL/_TLS
Digital certificates
VPNs
authentication protocols
digital signatures
Digital signatures
cryptographic protocols
Virtual private networks (VPNs)
Identity verification
Secure online transactions
secure email
secure file transfer
Email encryption
Secure messaging applications
Secure data transmission
Secure file transfer
Authentication tokens
Secure web browsing
gptkbp:uses asymmetric encryption
Asymmetric encryption
two keys
Two keys