Statements (94)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:crypt
|
gptkbp:based_on |
Factorization of large integers
factorization of large integers |
gptkbp:benefits |
Computationally intensive
No need to share private keys |
gptkbp:decryption_process |
uses private key for decryption
Ciphertext to plaintext |
gptkbp:developed_by |
gptkb:Adi_Shamir
gptkb:Ron_Rivest gptkb:Leonard_Adleman |
gptkbp:first_introduced |
gptkb:1977
|
gptkbp:first_published |
gptkb:Communications_of_the_ACM
|
gptkbp:has_programs |
gptkb:crypt
Encryption algorithm Decryption algorithm signature algorithm |
https://www.w3.org/2000/01/rdf-schema#label |
RSA Cryptography
|
gptkbp:invention |
gptkb:Adi_Shamir
gptkb:Ron_Rivest gptkb:1977 gptkb:Leonard_Adleman patented until 2000 |
gptkbp:is_implemented_in |
Various programming languages
various programming languages |
gptkbp:is_often_accompanied_by |
symmetric encryption
|
gptkbp:is_standardized_by |
gptkb:NIST
gptkb:PKCS#1 |
gptkbp:is_vulnerable_to |
Quantum computing threats
chosen ciphertext attacks timing attacks quantum computing attacks Key length concerns |
gptkbp:key |
commonly 2048 bits
commonly 4096 bits Typically 2048 bits or more |
gptkbp:key_exchange |
gptkb:Diffie-Hellman_key_exchange
|
gptkbp:key_feature |
Public key infrastructure (PKI)
Certificate authorities (CAs) |
gptkbp:key_generation |
Public key and private key
involves two large prime numbers involves modulus calculation involves public and private exponent calculation |
gptkbp:notable_applications |
gptkb:PGP
gptkb:SSH gptkb:HTTPS secure messaging digital certificates |
gptkbp:performance |
Slower than symmetric key algorithms
|
gptkbp:provides |
Authentication
Integrity Confidentiality confidentiality data integrity authentication key exchange mechanism |
gptkbp:related_to |
gptkb:crypt
gptkb:Elliptic_curve_cryptography gptkb:Mathematics Computer science Symmetric key cryptography |
gptkbp:requires |
gptkb:random_number_generation
secure key storage Two prime numbers |
gptkbp:security |
uses public key for encryption
difficulty of factoring large primes Difficulty of factoring large numbers Plaintext to ciphertext |
gptkbp:suitable_for |
large data encryption
|
gptkbp:used_by |
SSH (Secure Shell)
SSL/ TLS protocols PGP (Pretty Good Privacy) |
gptkbp:used_in |
gptkb:blockchain_technology
gptkb:SSL/_TLS Digital certificates VPNs authentication protocols digital signatures Digital signatures cryptographic protocols Virtual private networks (VPNs) Identity verification Secure online transactions secure email secure file transfer Email encryption Secure messaging applications Secure data transmission Secure file transfer Authentication tokens Secure web browsing |
gptkbp:uses |
asymmetric encryption
Asymmetric encryption two keys Two keys |