Rivest–Shamir–Adleman algorithm
GPTKB entity
Properties (57)
Predicate | Object |
---|---|
gptkbp:instanceOf |
currency
|
gptkbp:basedOn |
factorization of large integers
|
gptkbp:canAllocate |
uses modular exponentiation
|
gptkbp:developedBy |
gptkb:Adi_Shamir
gptkb:Ron_Rivest Leonard Adleman |
gptkbp:firstIntroduced |
1977
|
https://www.w3.org/2000/01/rdf-schema#label |
Rivest–Shamir–Adleman algorithm
|
gptkbp:improves |
post-quantum cryptography
|
gptkbp:influencedBy |
computational complexity theory
number theory |
gptkbp:is_used_in |
gptkb:SSL/TLS
digital certificates email encryption |
gptkbp:keyEvent |
Diffie-Hellman key exchange
|
gptkbp:keyIssues |
public key can be shared openly
at least 2048 bits commonly 2048 bits or more involves two keys requires secure storage of private key used for decryption used for encryption |
gptkbp:notableEvent |
asymmetric cryptography
|
gptkbp:notableFeature |
gptkb:RSA-PSS
VPNs file encryption cryptocurrency transactions secure messaging secure web browsing RSA-OAEP RSA-CRT RSA-KEM |
gptkbp:operates |
various programming languages
|
gptkbp:patentExpiration |
patent expired in 2000
|
gptkbp:patentStatus |
originally patented
|
gptkbp:performance |
slower than symmetric key algorithms
|
gptkbp:provides |
asymmetric encryption
digital signatures |
gptkbp:relatedTo |
gptkb:Elliptic_Curve_Cryptography
gptkb:P_vs_NP_problem authentication protocols secure communication RSA encryption cryptographic protocols digital rights management homomorphic encryption secure multiparty computation zero-knowledge proofs symmetric key algorithms RSA signature secure hash functions key distribution protocols |
gptkbp:security |
difficulty of integer factorization
uses modular exponentiation |
gptkbp:skills |
susceptible to quantum attacks
|
gptkbp:standardFeatures |
NIST
|
gptkbp:usedFor |
secure data transmission
|