The RSA Public-Key Cryptosystem

GPTKB entity

Statements (57)
Predicate Object
gptkbp:instance_of gptkb:crypt
gptkbp:based_on Factorization of large integers
gptkbp:decryption_process Private key decryption
gptkbp:developed_by gptkb:MIT
gptkbp:first_published gptkb:1977
gptkbp:has_applications_in gptkb:E-commerce
gptkb:blockchain_technology
Secure messaging
Virtual private networks (VPNs)
gptkbp:has_key_pair Private key
Public key
gptkbp:has_programs Mathematical algorithm
https://www.w3.org/2000/01/rdf-schema#label The RSA Public-Key Cryptosystem
gptkbp:invention gptkb:Adi_Shamir
gptkb:Ron_Rivest
gptkb:Leonard_Adleman
gptkbp:is_adopted_by Commercial software
Open-source projects
gptkbp:is_considered Secure for current standards
gptkbp:is_criticized_for Performance limitations
Key management issues
Vulnerability to side-channel attacks
gptkbp:is_described_as Computer science textbooks
gptkbp:is_discussed_in Cryptography research papers
gptkbp:is_implemented_in Software applications
Hardware devices
gptkbp:is_often_used_in gptkb:SSL/_TLS
Digital certificates
Secure communications
Email encryption
gptkbp:is_part_of Data protection
Information security
Network security
Public key infrastructure (PKI)
gptkbp:is_related_to gptkb:Elliptic_curve_cryptography
gptkb:Diffie-Hellman_key_exchange
gptkbp:is_standardized_by gptkb:NIST
gptkbp:is_supported_by Cryptographic libraries
gptkbp:is_taught_in Cryptography courses
gptkbp:is_used_by gptkb:Individuals
Governments
Corporations
gptkbp:is_vulnerable_to Quantum computing attacks
gptkbp:key 2048 bits
4096 bits
gptkbp:provides Authentication
Confidentiality
Digital signatures
gptkbp:requires Large prime numbers
gptkbp:security Public key encryption
Difficulty of factoring large primes
gptkbp:suitable_for Low-power devices
Real-time applications
gptkbp:used_in gptkb:crypt
gptkbp:uses Asymmetric cryptography
gptkbp:bfsParent gptkb:Rivest,_Ronald_L.
gptkbp:bfsLayer 6