What is the RSA algorithm? Definition from SearchSecurity (2024)

What is the RSA algorithm? Definition from SearchSecurity (1)

By

  • Michael Cobb

What is the RSA algorithm (Rivest-Shamir-Adleman)?

The RSA algorithm (Rivest-Shamir-Adleman) is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it is being sent over an insecure network such as the internet.

RSA was first publicly described in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman of the Massachusetts Institute of Technology, though the 1973 creation of a public key algorithm by British mathematician Clifford co*cks was kept classified by the U.K.'s GCHQ until 1997.

Public key cryptography, also known as asymmetric cryptography, uses two different but mathematically linked keys -- one public and one private. The public key can be shared with everyone, whereas the private key must be kept secret.

What is the RSA algorithm? Definition from SearchSecurity (2)

In RSA cryptography, both the public and the private keys can encrypt a message. The opposite key from the one used to encrypt a message is used to decrypt it. This attribute is one reason why RSA has become the most widely used asymmetric algorithm: It provides a method to assure the confidentiality, integrity, authenticity, and non-repudiation of electronic communications and data storage.

Many protocols, including Secure Shell (SSH), OpenPGP, S/MIME, and SSL/TLS, rely on RSA for encryption and digital signature functions. It is also used in software programs -- browsers are an obvious example, as they need to establish a secure connection over an insecure network, like the internet, or validate a digital signature. RSA signature verification is one of the most commonly performed operations in network-connected systems.

Why is the RSA algorithm used?

RSA derives its security from the difficulty of factoring large integers that are the product of two large prime numbers. Multiplying these two numbers is easy, but determining the original prime numbers from the total -- or factoring -- is considered infeasible due to the time it would take using even today's supercomputers.

The public and private key generation algorithm is the most complex part of RSA cryptography. Two large prime numbers, p and q, are generated using the Rabin-Miller primality test algorithm. A modulus, n, is calculated by multiplying p and q. This number is used by both the public and private keys and provides the link between them. Its length, usually expressed in bits, is called the key length.

The public key consists of the modulus n and a public exponent, e, which is normally set at 65537, as it's a prime number that is not too large. The e figure doesn't have to be a secretly selected prime number, as the public key is shared with everyone.

The private key consists of the modulus n and the private exponent d, which is calculated using the Extended Euclidean algorithm to find the multiplicative inverse with respect to the totient of n.

How does the RSA algorithm work?

Alice generates her RSA keys by selecting two primes: p=11 and q=13. The modulus is n=p×q=143. The totient is n ϕ(n)=(p−1)x(q−1)=120. She chooses 7 for her RSA public key e and calculates her RSA private key using the Extended Euclidean algorithm, which gives her 103.

Bob wants to send Alice an encrypted message, M, so he obtains her RSA public key (n, e) which, in this example, is (143, 7). His plaintext message is just the number 9 and is encrypted into ciphertext, C, as follows:

Me mod n = 97 mod 143 = 48 = C

When Alice receives Bob's message, she decrypts it by using her RSA private key (d, n) as follows:

Cd mod n = 48103 mod 143 = 9 = M

To use RSA keys to digitally sign a message, Alice would need to create a hash -- a message digest of her message to Bob -- encrypt the hash value with her RSA private key, and add the key to the message. Bob can then verify that the message has been sent by Alice and has not been altered by decrypting the hash value with her public key. If this value matches the hash of the original message, then only Alice could have sent it -- authentication and non-repudiation -- and the message is exactly as she wrote it -- integrity.

Alice could, of course, encrypt her message with Bob's RSA public key -- confidentiality -- before sending it to Bob. A digital certificate contains information that identifies the certificate's owner and also contains the owner's public key. Certificates are signed by the certificate authority that issues them, and they can simplify the process of obtaining public keys and verifying the owner.

What is the RSA algorithm? Definition from SearchSecurity (3)

How is RSA secure?

RSA security relies on the computational difficulty of factoring large integers. As computing power increases and more efficient factoring algorithms are discovered, the ability to factor larger and larger numbers also increases.

Encryption strength is directly tied to key size. Doubling key length can deliver an exponential increase in strength, although it does impair performance. RSA keys are typically 1024- or 2048-bits long, but experts believe that 1024-bit keys are no longer fully secure against all attacks. This is why the government and some industries are moving to a minimum key length of 2048-bits.

Barring an unforeseen breakthrough in quantum computing, it will be many years before longer keys are required, but elliptic curve cryptography (ECC) is gaining favor with many security experts as an alternative to RSA to implement public key cryptography. It can create faster, smaller and more efficient cryptographic keys.

Modern hardware and software are ECC-ready, and its popularity is likely to grow. It can deliver equivalent security with lower computing power and battery resource usage, making it more suitable for mobile apps than RSA.

A team of researchers, which included Adi Shamir, a co-inventor of RSA, successfully created a 4096-bit RSA key using acoustic cryptanalysis. However, note that any encryption algorithm is vulnerable to attack.

This was last updated in November 2021

Continue Reading About RSA algorithm (Rivest-Shamir-Adleman)

  • Symmetric vs. asymmetric encryption: Decipher the differences
  • Comparing Diffie-Hellman vs. RSA key exchange algorithms
  • Weighing double key encryption challenges, payoffs
  • Cryptography quiz questions and answers: Test your smarts

Related Terms

adaptive multifactor authentication (adaptive MFA)
Adaptive multifactor authentication (MFA) is a security mechanism intended to authenticate and authorize users through a variety ... Seecompletedefinition
one-time password
A one-time password (OTP) is an automatically generated numeric or alphanumeric string of characters that authenticates a user ... Seecompletedefinition
privileged identity management (PIM)
Privileged identity management (PIM) is the monitoring and protection of superuser accounts that hold expanded access to an ... Seecompletedefinition

Dig Deeper on Identity and access management

  • Explore the impact of quantum computing on cryptographyBy: RyanArel
  • Diffie-Hellman key exchange (exponential key exchange)By: AlexanderGillis
  • Symmetric vs. asymmetric encryption: What's the difference?By: MichaelCobb
  • encryptionBy: PeterLoshin
What is the RSA algorithm? Definition from SearchSecurity (2024)

FAQs

What is the RSA algorithm? Definition from SearchSecurity? ›

RSA is a type of asymmetric encryption, which uses two different but linked keys. In RSA cryptography, both the public and the private keys can encrypt a message. The opposite key from the one used to encrypt a message is used to decrypt it.

What is the RSA algorithm in simple terms? ›

RSA is a widely used cryptographic algorithm that was first introduced in 1977. It uses public and private key pairs to encrypt and decrypt data. Though RSA can be used in several applications, its computational complexity makes it unsuitable for encrypting large messages or files.

What is RSA in terms of security? ›

RSA (Rivest–Shamir–Adleman) is a public-key cryptosystem, one of the oldest widely used for secure data transmission. The initialism "RSA" comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman, who publicly described the algorithm in 1977.

What does the RSA stand for? ›

RSA means Rivest, Shamir, Adleman. These are the inventors of the popular RSA Algorithm. The RSA algorithm is based on public-key encryption technology which is a public-key cryptosystem for reliable data transmission.

What is the logic behind RSA algorithm? ›

The idea of RSA is based on the fact that it is difficult to factorize a large integer. The public key consists of two numbers where one number is a multiplication of two large prime numbers. And private key is also derived from the same two prime numbers.

What is a real world example of RSA algorithm? ›

These are some real-world examples that demonstrate the usage of RSA encryption in practice: Securing email messages in email providers. Encrypting messages in messaging apps and chat rooms. Securing P2P data transfer.

What is RSA and why it is used? ›

The Rivest-Shamir-Adleman (RSA) encryption algorithm is an asymmetric encryption algorithm that is widely used in many products and services. Asymmetric encryption uses a key pair that is mathematically linked to encrypt and decrypt data.

What does RSA tell you? ›

RSA is often used as an index of general vagal tone since there is a waxing and waning of parasympathetic influence with each breath when the autonomic nervous system is properly balanced.

What are the two types of RSA? ›

mRNA, rRNA, and tRNA are the three main types of RNA involved in protein synthesis. RNA also serves as the primary genetic material for viruses.

Is RSA still used? ›

RSA is a cryptography that continues to be prevalent in many technologies and products. RSA is a public-key mechanism for orchestrating secure data transmission and is one of the oldest key exchange algorithms.

What does the RSA do? ›

Our Mission is to support veterans and their families.

Local RSAs are managed by their own executive committee while being united with the RNZRSA in our strategic pillars, vision, and values. We believe in a nation joined by a heartfelt connection to the ANZAC spirit of courage, commitment, comradeship, and compassion.

What is the difference between AES and RSA? ›

While AES is a symmetric algorithm designed for rapid data encryption and decryption, RSA is an asymmetric method used primarily for secure key exchange and digital signatures. In certain scenarios, one may outperform the other, making the choice between AES and RSA crucial for optimal security and efficiency.

What are the weakness of RSA? ›

One of the biggest disadvantages of RSA is its low security for key length. A 3072 bit RSA key is required to provide security equivalent of 128 bits of symmetric encryption key. That makes it less efficient and slower than say Elliptical curve based cryptosystems which provide equivalent security in about 256 bits.

What does RSA stand for in cyber security? ›

The RSA algorithm (Rivest-Shamir-Adleman) is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it is being sent over an insecure network such as ...

What is the math behind RSA algorithm? ›

The Mathematics behind RSA. In RSA, we have two large primes p and q, a modulus N = pq, an encryption exponent e and a decryption exponent d that satisfy ed = 1 mod (p - 1)(q - 1). The public key is the pair (N,e) and the private key is d. C = Me mod N.

What is the study of RSA algorithm? ›

In the RSA algorithm, one party uses a public key and the other party uses a secret key, known as the private key. Each station randomly and independently choose two large primes p and q number, and multiplies them to produce n=pq.

What is the workflow of RSA algorithm? ›

The application of the RSA algorithm consists of three main processes, namely key generation, encryption, and decryption [26] . ... E-business security becomes an important issue in the development of technology, to ensure the safety and comfort of transactions in the exchange of information is privacy.

Top Articles
RICO and California Penal Code 186 PC: Understanding the Impact on Organized Crime - Valery Nechay Law
Clean Laptop: how to clean laptop
The Atlanta Constitution from Atlanta, Georgia
Midflorida Overnight Payoff Address
Rabbits Foot Osrs
Z-Track Injection | Definition and Patient Education
Deshret's Spirit
Pollen Count Los Altos
South Bend Tribune Online
Slmd Skincare Appointment
Guardians Of The Galaxy Vol 3 Full Movie 123Movies
123Moviescloud
Nonuclub
Diablo 3 Metascore
Chastity Brainwash
Adam4Adam Discount Codes
How to Create Your Very Own Crossword Puzzle
Pickswise Review 2024: Is Pickswise a Trusted Tipster?
Self-Service ATMs: Accessibility, Limits, & Features
Sef2 Lewis Structure
‘The Boogeyman’ Review: A Minor But Effectively Nerve-Jangling Stephen King Adaptation
R. Kelly Net Worth 2024: The King Of R&B's Rise And Fall
Pirates Of The Caribbean 1 123Movies
Jeff Nippard Push Pull Program Pdf
Disputes over ESPN, Disney and DirecTV go to the heart of TV's existential problems
BJ 이름 찾는다 꼭 도와줘라 | 짤방 | 일베저장소
Apparent assassination attempt | Suspect never had Trump in sight, did not get off shot: Officials
Local Collector Buying Old Motorcycles Z1 KZ900 KZ 900 KZ1000 Kawasaki - wanted - by dealer - sale - craigslist
Afni Collections
Free T33N Leaks
Usa Massage Reviews
R/Mp5
Otis Inmate Locator
Pixel Combat Unblocked
Grove City Craigslist Pets
Star News Mugshots
Haunted Mansion Showtimes Near Cinemark Tinseltown Usa And Imax
Pch Sunken Treasures
Helloid Worthington Login
Blue Beetle Movie Tickets and Showtimes Near Me | Regal
Domina Scarlett Ct
Bella Thorne Bikini Uncensored
Publictributes
Doordash Promo Code Generator
Top 40 Minecraft mods to enhance your gaming experience
Random Animal Hybrid Generator Wheel
60 Days From May 31
Unit 11 Homework 3 Area Of Composite Figures
Server Jobs Near
Meee Ruh
Ihop Deliver
Provincial Freeman (Toronto and Chatham, ON: Mary Ann Shadd Cary (October 9, 1823 – June 5, 1893)), November 3, 1855, p. 1
Latest Posts
Article information

Author: Eusebia Nader

Last Updated:

Views: 5845

Rating: 5 / 5 (60 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Eusebia Nader

Birthday: 1994-11-11

Address: Apt. 721 977 Ebert Meadows, Jereville, GA 73618-6603

Phone: +2316203969400

Job: International Farming Consultant

Hobby: Reading, Photography, Shooting, Singing, Magic, Kayaking, Mushroom hunting

Introduction: My name is Eusebia Nader, I am a encouraging, brainy, lively, nice, famous, healthy, clever person who loves writing and wants to share my knowledge and understanding with you.