RSA standard

Technology

A widely used public-key encryption standard that is highly vulnerable to being broken by quantum computers running Shor's Algorithm.


entitydetail.created_at

8/19/2025, 9:47:22 PM

entitydetail.last_updated

8/19/2025, 9:52:57 PM

entitydetail.research_retrieved

8/19/2025, 9:52:57 PM

Summary

The RSA standard is a foundational public-key cryptography algorithm, named after its inventors Ron Rivest, Adi Shamir, and Leonard Adleman, and first introduced in 1977. It is a widely adopted asymmetric encryption method, whose security relies on the computational difficulty of factoring large prime numbers, enabling secure digital communications, digital signatures, and key exchanges. While distinct from RSA Security LLC—the company founded in 1982 and also named after the inventors—the algorithm is a cornerstone of modern digital security, used in protocols like TLS/SSL and VPNs. However, the RSA standard faces an accelerating threat from advancements in quantum computing, particularly Shor's Algorithm and developments such as Google's Willow quantum chip, highlighting the urgent need for a global transition to post-quantum encryption methods.

Referenced in 1 Document
Research Data
Extracted Attributes
  • Type

    Asymmetric encryption algorithm

  • Inventors

    Ron Rivest, Adi Shamir, Leonard Adleman

  • Limitation

    Computational complexity makes it unsuitable for direct encryption of large messages/files

  • Key Mechanism

    Uses a pair of mathematically linked keys (public key for encryption, private key for decryption)

  • Vulnerability

    Quantum computing (specifically Shor's Algorithm)

  • Security Basis

    Computational difficulty of factoring the product of two large prime numbers

  • Common Key Size

    2,048-bit (deemed sufficient until 2030 by NIST)

  • Related Standard

    RSA-PSS (Probabilistic Signature Scheme for RSA)

  • Primary Applications

    Secure communications, Digital signatures, Authentication, Key exchange, Digital certificates, Web access, Email messages

  • Highest Security Key Size

    4,096-bit

Timeline
  • The RSA algorithm was first introduced. (Source: Web Search Results)

    1977

  • RSA Security LLC, the company named after the algorithm's inventors, was founded. (Source: Wikipedia)

    1982

  • RSA Security LLC was acquired by EMC Corporation for US$2.1 billion. (Source: Wikipedia)

    2006-XX-XX

  • RSA Security LLC became part of Dell Technologies after EMC's acquisition by Dell. (Source: Wikipedia)

    2016-XX-XX

  • RSA Security LLC was sold by Dell Technologies to a consortium led by Symphony Technology Group for US$2.1 billion. (Source: Wikipedia)

    2020-03-10

  • Google's Willow (Quantum Chip) development accelerates the threat to RSA encryption, emphasizing the need for post-quantum encryption. (Source: Related Documents)

    Ongoing

  • NIST deems RSA 2,048-bit keys to be sufficient for security. (Source: Web Search Results)

    Ongoing (until 2030)

RSA Security

RSA Security LLC, formerly RSA Security, Inc. and trade name RSA, is an American computer and network security company with a focus on encryption and decryption standards. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Leonard Adleman, after whom the RSA public key cryptography algorithm was also named. Among its products is the SecurID authentication token. The BSAFE cryptography libraries were also initially owned by RSA. RSA is known for incorporating backdoors developed by the NSA in its products. It also organizes the annual RSA Conference, an information security conference. Founded as an independent company in 1982, RSA Security was acquired by EMC Corporation in 2006 for US$2.1 billion and operated as a division within EMC. When EMC was acquired by Dell Technologies in 2016, RSA became part of the Dell Technologies family of brands. On 10 March 2020, Dell Technologies announced that they will be selling RSA Security to a consortium, led by Symphony Technology Group (STG), Ontario Teachers’ Pension Plan Board (Ontario Teachers’) and AlpInvest Partners (AlpInvest) for US$2.1 billion, the same price when it was bought by EMC back in 2006. RSA is based in Burlington, Massachusetts, with regional headquarters in Bracknell (UK) and Singapore, and numerous international offices.

Web Search Results
  • RSA Algorithm in Cryptography: Rivest Shamir Adleman Explained

    The RSA algorithm is a foundational public-key cryptography system that enables secure data transmission using a pair of keys: a public key for encryption and a private key for decryption. Its security is based on the computational difficulty of factoring the product of two large prime numbers, making RSA a cornerstone of modern digital security for applications like secure communications, digital signatures, and authentication. [...] ## Summing up RSA RSA is a widely used cryptographic algorithm that was first introduced in 1977. It uses public and private key pairs to encrypt and decrypt data. Though RSA can be used in several applications, its computational complexity makes it unsuitable for encrypting large messages or files. Currently, RSA creates digital signatures and certificates for secure authentication, communication, web access and email messages and key exchanges. [...] This makes RSA one of the most widely used encryption mechanisms worldwide. However, the computational complexity of RSA, it is not ideal to encrypt a huge amount of data. To manage this goal, RSA is used to encrypt a symmetric key. The key is then used to encrypt the actual huge data. This hybrid approach utilizes both asymmetric and symmetric cryptography for efficient encryption. (Read our primer on AES, another common encryption standard.) ## How does RSA work?

  • What is RSA? How does an RSA work?

    The Rivest-Shamir-Adleman (RSA) encryption algorithm is an asymmetric encryption algorithm that is widely used in many products and services. Asymmetric encryption uses a key pair that is mathematically linked to encrypt and decryptdata. A private and public key are created, with the public key being accessible to anyone and the private key being a secret known only by the key pair creator. With RSA, either the private or public key can encrypt the data, while the other key decrypts it. This is [...] RSA was used with Transport Layer Security (TLS) to secure communications between two individuals. Other well-known products and algorithms, like the Pretty Good Privacy algorithm, use RSA either currently or in the past. Virtual Private Networks (VPNs), email services, web browsers, and other communication channels have used RSA as well. VPNs will use TLS to implement a handshake between the two parties in the information exchange. The TLS Handshake will use RSA as its encryption algorithm, to

  • RSA cryptosystem

    Standards such as PKCS#1 have been carefully designed to securely pad messages prior to RSA encryption. Because these schemes pad the plaintext m with some number of additional bits, the size of the un-padded message M must be somewhat smaller. RSA padding schemes must be carefully designed so as to prevent sophisticated attacks that may be facilitated by a predictable message structure. Early versions of the PKCS#1 standard (up to version 1.5) used a construction that appears to make RSA [...] be replaced wherever possible. The PKCS#1 standard also incorporates processing schemes designed to provide additional security for RSA signatures, e.g. the Probabilistic Signature Scheme for RSA (RSA-PSS). [...] A basic principle behind RSA is the observation that it is practical to find three very large positive integers e, d, and n, such that for all integers m (0 ≤ _m_<_n_), both (m e)d{\displaystyle (m^{e})^{d}}Image 5: {\displaystyle (m^{e})^{d}} and m{\displaystyle m}Image 6: {\displaystyle m} have the same remainder when divided by n{\displaystyle n}Image 7: {\displaystyle n} (they are congruent modulon{\displaystyle n}Image 8: {\displaystyle n}):(m e)d≡m(mod n).{\displaystyle (m^{e})^{d}\equiv

  • What is the RSA algorithm? | Definition from TechTarget

    RSA is a type of asymmetric encryption that uses two different but linked keys. In RSA cryptography, both the public and the private keys can encrypt a message. The opposite key from the one used to encrypt a message is used to decrypt it. This attribute is one reason why RSA has become the most used asymmetric algorithm. It provides a method to assure the confidentiality, integrity, authenticity and nonrepudiation of electronic communications and data storage. [...] # What is the RSA algorithm? The RSA algorithm (Rivest-Shamir-Adleman) is a public key cryptosystem that uses a pair of keys to secure digital communication and transactions over insecure networks, such as the internet. Public key cryptography, also known as asymmetric cryptography, uses two different but mathematically linked keys -- one public and one private. The public key can be shared with everyone, whereas the private key must be kept secret. [...] However, because of the performance issues, 4,096-bit keys are generally only used in situations where the highest level of security is required. The 2,048-bit keys continue to be the commonly accepted best practice. The National Institute of Standards and Technology deems RSA 2,048-bit keys to be sufficient until 2030.

  • Understanding RSA Asymmetric Encryption: How It Works - SecureW2

    RSA Encryption -------------- RSA encryption, a type of public key cryptography, is one of the encryption algorithms that employ asymmetric encryption. Introduced in 1977, RSA was named after its inventors—Ron Rivest, Adi Shamir, and Leonard Adleman. Pioneering the field, it was the first of its kind to be able to serve both purposes of encrypting data for confidentiality and creating digital signatures for integrity and non-repudiation. [...] Comparing RSA and AES (Advanced Encryption Standard) isn’t straightforward since they serve different purposes and have unique strengths. AES is a symmetric encryption algorithm and is faster, making it ideal for encrypting large volumes of sensitive data. On the other hand, RSA is an asymmetric encryption algorithm that stands out for its robust security, making it perfect for securely exchanging keys and creating digital signatures. While AES is characterized by its speed, RSA is marked by [...] SSL/TLS for Web Security: RSA is a critical part of the SSL/TLS protocol, which is used to secure communications on the internet. It ensures that data transmitted over networks, such as credit card information or personal details, is secure and safe from hackers. VPN Connections: RSA is also used in Virtual Private Network (VPN) connections to secure data transmission over untrusted networks. It is typically used during the initial key exchange process.

Location Data

Standard, Bantry Road, River Club, Johannesburg Ward 103, Randburg, City of Johannesburg Metropolitan Municipality, Gauteng, 1865, South Africa

bank

Coordinates: -26.0745800, 28.0276200

Open Map