Statements (51)
Predicate | Object |
---|---|
gptkbp:instanceOf |
digital signature
|
gptkbp:alternativeTo |
gptkb:EdDSA
gptkb:DSA gptkb:ECDSA |
gptkbp:basedOn |
gptkb:RSA_algorithm
|
gptkbp:brokenBy |
sufficiently large quantum computer
|
gptkbp:category |
asymmetric cryptography
public key signature scheme |
gptkbp:dependsOn |
integer factorization problem
|
https://www.w3.org/2000/01/rdf-schema#label |
RSA Signature Algorithm
|
gptkbp:introducedIn |
1977
|
gptkbp:inventedBy |
gptkb:Adi_Shamir
gptkb:Leonard_Adleman gptkb:Ron_Rivest |
gptkbp:keySize |
1024 bits
2048 bits 4096 bits |
gptkbp:requires |
message digest
key pair secure random number generation prime number generation |
gptkbp:specifies |
gptkb:RFC_8017
gptkb:FIPS_186-4 |
gptkbp:standardizedBy |
gptkb:PKCS_#1
gptkb:X.509 |
gptkbp:usedFor |
digital signatures
|
gptkbp:usedIn |
gptkb:SSL/TLS
gptkb:cryptocurrency gptkb:PGP gptkb:S/MIME SSH cryptography digital certificates authentication smart cards code signing integrity verification secure email document signing |
gptkbp:uses |
gptkb:PKCS#1_v1.5
hash functions public key cryptography modular exponentiation private key cryptography padding schemes PSS (Probabilistic Signature Scheme) |
gptkbp:vulnerableTo |
quantum computers
side-channel attacks chosen ciphertext attacks |
gptkbp:bfsParent |
gptkb:FIPS_186-5
|
gptkbp:bfsLayer |
6
|