Statements (51)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:digital_signature
|
| gptkbp:alternativeTo |
gptkb:EdDSA
gptkb:DSA gptkb:ECDSA |
| gptkbp:basedOn |
gptkb:RSA_algorithm
|
| gptkbp:brokenBy |
sufficiently large quantum computer
|
| gptkbp:category |
asymmetric cryptography
public key signature scheme |
| gptkbp:dependsOn |
integer factorization problem
|
| gptkbp:introducedIn |
1977
|
| gptkbp:inventedBy |
gptkb:Adi_Shamir
gptkb:Leonard_Adleman gptkb:Ron_Rivest |
| gptkbp:keySize |
1024 bits
2048 bits 4096 bits |
| gptkbp:requires |
message digest
key pair secure random number generation prime number generation |
| gptkbp:specifies |
gptkb:RFC_8017
gptkb:FIPS_186-4 |
| gptkbp:standardizedBy |
gptkb:PKCS_#1
gptkb:X.509 |
| gptkbp:usedFor |
digital signatures
|
| gptkbp:usedIn |
gptkb:SSL/TLS
gptkb:cryptocurrency gptkb:PGP gptkb:S/MIME SSH cryptography digital certificates authentication smart cards code signing integrity verification secure email document signing |
| gptkbp:uses |
gptkb:PKCS#1_v1.5
hash functions public key cryptography modular exponentiation private key cryptography padding schemes PSS (Probabilistic Signature Scheme) |
| gptkbp:vulnerableTo |
quantum computers
side-channel attacks chosen ciphertext attacks |
| gptkbp:bfsParent |
gptkb:FIPS_186-5
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
RSA Signature Algorithm
|