Search results
Jump to navigation
Jump to search
Page title matches
- The '''RSA algorithm''' is the best known and most widely used [[public key]] encryption algorit Staff at RSA Laboratories wrote a specification for use of the RSA algorithm in Internet protocols. The current version is RFC 2437. RSA is used in many7 KB (1,171 words) - 05:48, 8 April 2024
- 152 bytes (19 words) - 18:53, 29 July 2010
- 259 bytes (33 words) - 18:53, 29 July 2010
Page text matches
- #REDIRECT [[RSA algorithm]]27 bytes (3 words) - 18:56, 29 July 2010
- #REDIRECT [[RSA algorithm]]27 bytes (3 words) - 18:59, 29 July 2010
- #REDIRECT [[RSA algorithm]]27 bytes (3 words) - 18:55, 29 July 2010
- #REDIRECT [[RSA algorithm]]27 bytes (3 words) - 18:53, 29 July 2010
- #REDIRECT [[RSA algorithm/Definition]]38 bytes (4 words) - 18:53, 29 July 2010
- #REDIRECT [[RSA algorithm/Related Articles]]44 bytes (5 words) - 18:53, 29 July 2010
- ...stitute]] in Israel. He is the "S" in "RSA", one of the inventors of the [[RSA algorithm]].265 bytes (43 words) - 08:38, 22 October 2010
- [[Cryptography|Cryptographer]] who teaches at [[MIT]], co-inventor of the [[RSA algorithm]], the most widely used public key encryption technique.182 bytes (22 words) - 20:04, 29 July 2010
- ...lution to the [[integer factorisation]] problem would break RSA; see the [[RSA algorithm#RSA_and_factoring | RSA article]] for discussion. The difficulty with that1 KB (215 words) - 05:48, 8 April 2024
- Supported [[public key]] algorithms are [[RSA algorithm|RSA]], [[El Gamal]] (encrypt-only, not for signatures), and [[Digital Signa910 bytes (125 words) - 05:49, 8 April 2024
- {{r|RSA algorithm}}251 bytes (31 words) - 18:32, 13 March 2024
- ...cryptographer who teaches at MIT. He is probably best known as the "R" in RSA algorithm|RSA, co-inventor of of the most widely used public key encryption technique1 KB (195 words) - 07:35, 18 March 2024
- {{r|RSA algorithm}}398 bytes (43 words) - 20:00, 29 July 2010
- {{r|RSA algorithm}}568 bytes (75 words) - 20:10, 29 July 2010
- {{r|RSA algorithm}}707 bytes (89 words) - 20:09, 29 July 2010
- The '''RSA algorithm''' is the best known and most widely used [[public key]] encryption algorit Staff at RSA Laboratories wrote a specification for use of the RSA algorithm in Internet protocols. The current version is RFC 2437. RSA is used in many7 KB (1,171 words) - 05:48, 8 April 2024
- {{r|RSA algorithm}}1 KB (173 words) - 14:49, 4 April 2024
- ...}</ref> In 1978, Ronald Rivest, Adi Shamir, and Len Adleman invented the [[RSA algorithm]], another public-key system<ref name=RSA>{{citation ...ic key is used with the message to check the validity of the signature. [[RSA algorithm|RSA]] and [[Digital Signature Algorithm|DSA]] are two of the most popular d8 KB (1,233 words) - 05:48, 8 April 2024
- Suppose you want to factor N = pq with p, q odd primes, the [[RSA algorithm|RSA]] problem. Use discrete log to solve for x in 2<sup>x</sup>5 KB (772 words) - 17:15, 6 August 2013
- At one point, the US patent on the [[RSA algorithm]] meant some versions were restricted in the US that were not elsewhere. Th7 KB (1,143 words) - 05:49, 8 April 2024
- ...s hard in the worst case. A well-known example is the moduli used in the [[RSA algorithm]] for [[public key cryptography]]; an RSA modulus is a product of two prime15 KB (2,548 words) - 21:03, 20 August 2010
- * The [[RSA algorithm]] for [[public key]] cryptography, from [[Ron Rivest]], [[Adi Shamir]] and5 KB (823 words) - 20:23, 19 September 2011
- on the [[RSA algorithm]] for [[public key]] cryptography.5 KB (793 words) - 05:49, 8 April 2024
- | date = Nov. 1976}} pages = 644-654</ref> and the public release of the [[RSA algorithm]]. Since then, cryptography has become a widely used tool in communications9 KB (1,312 words) - 05:49, 8 April 2024
- * The [[RSA algorithm]] (named for its inventors: Rivest, Shamir and Adleman) is a very widely us * PGP and FreeS/WAN used slightly different variants of the RSA algorithm ([[RSA algorithm#Implementation_differences |explanation]]), so some signature verifications40 KB (6,219 words) - 05:49, 8 April 2024
- For example generating [[RSA algorithm|RSA]] keys requires large random primes, [[Diffie-Hellman]] key agreement r Any public key technique can provide digital signatures. The [[RSA algorithm]] is widely used, as is the US government standard [[Digital Signature Algo52 KB (8,332 words) - 05:49, 8 April 2024
- ...their security from the difficulty of a mathematical problem — the [[RSA algorithm]] from [[integer factorisation]], the [[Diffie-Hellman]] protocol from the }}</ref> defeat [[RSA algorithm|RSA]] and other [[public key]] systems.32 KB (4,913 words) - 14:38, 18 March 2024
- ...their security from the difficulty of a mathematical problem — the [[RSA algorithm]] from [[integer factorisation]], the [[Diffie-Hellman]] protocol from the }}</ref> defeat [[RSA algorithm|RSA]] and other [[public key]] systems.32 KB (4,916 words) - 05:49, 8 April 2024
- ...public key]] operation as a block cipher. For example, one might use the [[RSA algorithm]] with 1024-bit keys as a block cipher with 1024-bit blocks. Since the roun53 KB (8,371 words) - 05:48, 8 April 2024
- Adam Back wrote a version of the RSA algorithm for public key cryptography in three lines of Perl <ref>{{citation35 KB (5,430 words) - 07:27, 18 March 2024