RSA encryption - definition. What is RSA encryption
Diclib.com
قاموس ChatGPT
أدخل كلمة أو عبارة بأي لغة 👆
اللغة:

ترجمة وتحليل الكلمات عن طريق الذكاء الاصطناعي ChatGPT

في هذه الصفحة يمكنك الحصول على تحليل مفصل لكلمة أو عبارة باستخدام أفضل تقنيات الذكاء الاصطناعي المتوفرة اليوم:

  • كيف يتم استخدام الكلمة في اللغة
  • تردد الكلمة
  • ما إذا كانت الكلمة تستخدم في كثير من الأحيان في اللغة المنطوقة أو المكتوبة
  • خيارات الترجمة إلى الروسية أو الإسبانية، على التوالي
  • أمثلة على استخدام الكلمة (عدة عبارات مع الترجمة)
  • أصل الكلمة

%ما هو (من)٪ 1 - تعريف

ALGORITHM FOR PUBLIC-KEY CRYPTOGRAPHY
RSA cryptosystem; RSA encryption; Rivest-Shamir-Adleman; RSA algorithm; RSA Cryptosystem; Rsa encryption; RSA cipher; Branch prediction analysis attacks; Branch prediction analysis; Rivest Shamir Adleman; Rivest, Shamir, Adleman; Rsa Algorithm; Rivest-Shamir-Adleman Algorithm; Rsa algorithm; Rivest-Shamir-Adleman algorithm; RSA (algorithm); RSA public key cryptography; RSA (crypto); Rivest-Shamir-Adelson; Rivest-Shamir-Adelman; Rivest–Shamir–Adleman cryptosystem; Rivest–Shamir–Adleman; Rivest-Shamir-Adleman cryptosystem
  • [[Adi Shamir]], co-inventor of RSA (the others are [[Ron Rivest]] and [[Leonard Adleman]])

RSA encryption         
<cryptography, algorithm> A public-key cryptosystem for both encryption and authentication, invented in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. Its name comes from their initials. The RSA algorithm works as follows. Take two large {prime numbers}, p and q, and find their product n = pq; n is called the modulus. Choose a number, e, less than n and {relatively prime} to (p-1)(q-1), and find its reciprocal mod (p-1)(q-1), and call this d. Thus ed = 1 mod (p-1)(q-1); e and d are called the public and private exponents, respectively. The public key is the pair (n, e); the private key is d. The factors p and q must be kept secret, or destroyed. It is difficult (presumably) to obtain the private key d from the public key (n, e). If one could factor n into p and q, however, then one could obtain the private key d. Thus the entire security of RSA depends on the difficulty of factoring; an easy method for factoring products of large prime numbers would break RSA. RSA FAQ (http://rsa.com/rsalabs/faq/faq_home.html). (2004-07-14)
RSA (cryptosystem)         
RSA (Rivest–Shamir–Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest.
RSA Data Security, Inc.         
  • alt=A suburban office building
  • RSA SecurID [[security token]]s.
AMERICAN COMPUTER AND NETWORK SECURITY COMPANY
RSA Data Security; RSA Laboratories; Rsa labs; RSA labs; PassMark Security; Rsa security; RSA Data Security, Inc.; RSADSI; RSA Data Security, Inc; RSA Data Security Inc; RSA Data Security Inc.; Rsadsi; RSA, The Security Division of EMC; Rsa Data Security Inc; Aveksa; Rsa Labs; RSA Labs; RSA (security firm); Cyota
<cryptography, company> (After Rivest, Shamir, Adleman - see RSA) A recognised world leader in cryptography, with millions of copies of its software encryption and authentication installed and in use worldwide. RSA's technologies are the global de facto standard for {public key cryptography} and digital signatures, and are part of existing and proposed standards for the Internet, ITU-T, ISO, ANSI, PKCS, IEEE and business and financial networks around the world. http://rsa.com/. (1994-12-08)

ويكيبيديا

RSA (cryptosystem)

RSA (Rivest–Shamir–Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym "RSA" comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman, who publicly described the algorithm in 1977. An equivalent system was developed secretly in 1973 at Government Communications Headquarters (GCHQ) (the British signals intelligence agency) by the English mathematician Clifford Cocks. That system was declassified in 1997.

In a public-key cryptosystem, the encryption key is public and distinct from the decryption key, which is kept secret (private). An RSA user creates and publishes a public key based on two large prime numbers, along with an auxiliary value. The prime numbers are kept secret. Messages can be encrypted by anyone, via the public key, but can only be decoded by someone who knows the prime numbers.

The security of RSA relies on the practical difficulty of factoring the product of two large prime numbers, the "factoring problem". Breaking RSA encryption is known as the RSA problem. Whether it is as difficult as the factoring problem is an open question. There are no published methods to defeat the system if a large enough key is used.

RSA is a relatively slow algorithm. Because of this, it is not commonly used to directly encrypt user data. More often, RSA is used to transmit shared keys for symmetric-key cryptography, which are then used for bulk encryption–decryption.