RSA encryption | Definition, Example, & Facts (2024)

RSA encryption, in full Rivest-Shamir-Adleman encryption, type of public-key cryptography widely used for data encryption of e-mail and other digital transactions over the Internet. RSA is named for its inventors, Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman, who created it while on the faculty at the Massachusetts Institute of Technology.

In the RSA system, a user secretly chooses a pair of prime numbers p and q so large that factoring the product n=pq is well beyond projected computing capabilities for the lifetime of the ciphers. As of 2015, U.S. government security standards call for the modulus to be at least 2,048 bits in size—i.e., p and q each have to be about 308 decimal digits in size, so n is roughly a 617-digit number. Since the largest hard numbers that can currently be factored are only half this size and since the difficulty of factoring roughly doubles for each additional three digits in the modulus, 617-digit moduli are believed to be safe from factoring for several decades.

Having chosen p and q, the user selects an arbitrary integer e less than n and relatively prime to p−1 and q−1—that is, so that 1 is the only factor in common between e and the product (p−1)(q−1). This assures that there is another number d for which the product ed will leave a remainder of 1 when divided by the least common multiple of p−1 and q−1. With knowledge of p and q, the number d can easily be calculated using the Euclidean algorithm. If one does not know p and q, it is equally difficult to find either e or d given the other as to factor n, which is the basis for the cryptosecurity of the RSA algorithm.

The labels d and e will be used to denote the function to which a key is put, but, as keys are completely interchangeable, this is only a convenience for exposition. To implement a secrecy channel using the standard two-key version of the RSA cryptosystem, user A would publish e and n in an authenticated public directory but keep d secret. Anyone wishing to send a private message to A would encode it into numbers less than n and then encrypt it using a special formula based on e and n. A can decrypt such a message based on knowing d, but the presumption—and evidence thus far—is that for almost all ciphers no one else can decrypt the message unless one can also factor n.

Similarly, to implement an authentication channel, user A would publish d and n and keep e secret. In the simplest use of this channel for identity verification, user B can verify that B is in communication with A by looking in the directory to find A’s decryption key d and sending A a message to be encrypted. If B gets back a cipher that decrypts to B’s challenge message using d to decrypt it, B will know that it was in all probability created by someone knowing e and hence that the other communicant is probably A.

Digitally signing a message is a more complex operation and requires a cryptosecure “hashing” function. This is a publicly known function that maps any message into a smaller message—called a digest—in which each bit of the digest is dependent on every bit of the message in such a way that changing even one bit in the message is apt to change, in a cryptosecure way, half of the bits in the digest. By cryptosecure it is meant that it is computationally infeasible for anyone to find a message that will produce a preassigned digest and equally hard to find another message with the same digest as a known one. To sign a message—which may not even need to be kept secret—A encrypts the digest with the secret e, which A appends to the message. Anyone can then decrypt the message using the public key d to recover the digest, which one can also compute independently from the message. If the two agree, one must conclude that A originated the cipher, since only A knew e and hence could have encrypted the message.

Get a Britannica Premium subscription and gain access to exclusive content. Subscribe Now

Thus far, all proposed two-key cryptosystems exact a very high price for the separation of the privacy or secrecy channel from the authentication or signature channel. The greatly increased amount of computation involved in the asymmetric encryption/decryption process significantly cuts the channel capacity (bits per second of message information communicated). For roughly 20 years, for comparably secure systems, it has been possible to achieve a throughput 1,000 to 10,000 times higher for single-key than for two-key algorithms. As a result, the main application of two-key cryptography is in hybrid systems. In such a system a two-key algorithm is used for authentication and digital signatures or to exchange a randomly generated session key to be used with a single-key algorithm at high speed for the main communication. At the end of the session this key is discarded.

Gustavus J. Simmons

RSA encryption | Definition, Example, & Facts (2024)
Top Articles
Does PayBright Affect Your Credit Score? | KOHO
Write one example of point to point communication.
Zabor Funeral Home Inc
Sound Of Freedom Showtimes Near Governor's Crossing Stadium 14
La connexion à Mon Compte
Crocodile Tears - Quest
Plus Portals Stscg
Arrests reported by Yuba County Sheriff
Bloxburg Image Ids
What is IXL and How Does it Work?
Craigslist Heavy Equipment Knoxville Tennessee
Scholarships | New Mexico State University
Jc Post News
I Wanna Dance with Somebody : séances à Paris et en Île-de-France - L'Officiel des spectacles
Available Training - Acadis® Portal
Kürtçe Doğum Günü Sözleri
Powerball winning numbers for Saturday, Sept. 14. Check tickets for $152 million drawing
Convert 2024.33 Usd
Inter-Tech IM-2 Expander/SAMA IM01 Pro
Ruben van Bommel: diepgang en doelgerichtheid als wapens, maar (nog) te weinig rendement
Bridge.trihealth
Earl David Worden Military Service
ELT Concourse Delta: preparing for Module Two
Mychart Anmed Health Login
라이키 유출
Ppm Claims Amynta
Hannaford To-Go: Grocery Curbside Pickup
Bethel Eportal
Valic Eremit
How do you get noble pursuit?
Umn Biology
Taylored Services Hardeeville Sc
897 W Valley Blvd
Productos para el Cuidado del Cabello Después de un Alisado: Tips y Consejos
Edict Of Force Poe
Craigslist Boats Eugene Oregon
Snohomish Hairmasters
Muziq Najm
Wsbtv Fish And Game Report
Htb Forums
Wait List Texas Roadhouse
Oppenheimer Showtimes Near B&B Theatres Liberty Cinema 12
Miami Vice turns 40: A look back at the iconic series
11 Best Hotels in Cologne (Köln), Germany in 2024 - My Germany Vacation
At Home Hourly Pay
Yourcuteelena
Ucla Basketball Bruinzone
Reli Stocktwits
Poster & 1600 Autocollants créatifs | Activité facile et ludique | Poppik Stickers
Osrs Vorkath Combat Achievements
Strange World Showtimes Near Century Federal Way
OSF OnCall Urgent Care treats minor illnesses and injuries
Latest Posts
Article information

Author: Msgr. Refugio Daniel

Last Updated:

Views: 6744

Rating: 4.3 / 5 (54 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Msgr. Refugio Daniel

Birthday: 1999-09-15

Address: 8416 Beatty Center, Derekfort, VA 72092-0500

Phone: +6838967160603

Job: Mining Executive

Hobby: Woodworking, Knitting, Fishing, Coffee roasting, Kayaking, Horseback riding, Kite flying

Introduction: My name is Msgr. Refugio Daniel, I am a fine, precious, encouraging, calm, glamorous, vivacious, friendly person who loves writing and wants to share my knowledge and understanding with you.