Statements (54)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Wrestling
|
gptkbp:based_on |
RSA algorithm
|
gptkbp:can_be_used_for |
code signing
email signing |
gptkbp:dependency |
gptkb:Mathematics
large prime factorization |
https://www.w3.org/2000/01/rdf-schema#label |
RSA signature scheme
|
gptkbp:introduced_in |
gptkb:1977
|
gptkbp:involves |
private key
public key |
gptkbp:is_affected_by |
advancements in computing power
advancements in cryptanalysis |
gptkbp:is_considered_secure_when |
key length is sufficient
|
gptkbp:is_described_as |
cryptography textbooks
|
gptkbp:is_discussed_in |
academic papers
|
gptkbp:is_evaluated_by |
security audits
cryptographic researchers |
gptkbp:is_implemented_in |
gptkb:mobile_applications
operating systems web browsers cryptographic libraries |
gptkbp:is_often_used_in |
gptkb:SSL/_TLS
|
gptkbp:is_part_of |
digital signatures
cryptographic protocols secure file transfer secure messaging systems PKI (Public Key Infrastructure) |
gptkbp:is_related_to |
encryption
digital certificates decryption |
gptkbp:is_subject_to |
legal regulations
|
gptkbp:is_supported_by |
standards organizations
|
gptkbp:is_taught_in |
computer science courses
|
gptkbp:is_used_by |
gptkb:developers
gptkb:financial_institutions government agencies |
gptkbp:is_used_for |
gptkb:Linux
identity verification digital rights management |
gptkbp:is_used_in |
gptkb:blockchain_technology
VPNs secure communications secure email |
gptkbp:is_vulnerable_to |
quantum attacks
|
gptkbp:named_after |
gptkb:Rivest,_Shamir,_and_Adleman
|
gptkbp:provides |
data integrity
authentication non-repudiation |
gptkbp:requires |
gptkb:crypt
key generation |
gptkbp:suitable_for |
real-time applications
|
gptkbp:uses |
asymmetric cryptography
|
gptkbp:bfsParent |
gptkb:Rabin's_signature
|
gptkbp:bfsLayer |
5
|