hie friends,
Anyone associated with cryptography or data security, I want to know about RSA algorithm in data security. Can some of you provide me the useful information regarding this algorithm ?
thnx a lot
hie friends,
Anyone associated with cryptography or data security, I want to know about RSA algorithm in data security. Can some of you provide me the useful information regarding this algorithm ?
thnx a lot
RSA algorithm is the most traditional and widely used aldorithm for data security.
First, lets go through the history of RSA algorithm
Ron Rivest, Adi Shamir and Leonard Adleman developed the RSA encryption algorithm in 1977. They founded RSA Data Security in 1982.
In 1995 RSA sent a handful of people across the hall to found Digital Certificates International (better known as VeriSign).
The company then called Security Dynamics acquired RSA Data Security in July 1996 and DynaSoft AB in 1997.
In January 1997 it proposed the first of the DES Challenges which led to the first public breaking of a message based on the Data Encryption Standard.
In February 2001, it acquired Xcert International, Inc., a privately held company that developed and delivered digital certificate-based products for securing e-business transactions.
In May 2001, it acquired 3-G International, Inc., a privately held company that developed and delivered smart card and biometric authentication products.
In August 2001, it acquired Securant Technologies, Inc., a privately held company that produced ClearTrust, an identity management product.
In December 2005, it acquired Cyota, a privately held company specializing in online security and anti-fraud solutions for financial institutions.
In April 2006 it acquired PassMark Security
On June 29, 2006 it was announced that EMC Corporation will acquire RSA Security for $2.1 billion.
On September 14, 2006 RSA stockholders approved the acquisition of the company by EMC Corporation
On 2007 RSA acquired Valyd Software, a Hyderabad based Indian company specializing in File and Data Security .
RSA Technique
RSA's security systems are based on a mathematical theory for public-key encryption, which encodes data using formulas called algorithms. Public-key encryption represented a huge step beyond earlier encryption systems, which relied on a single "key" to encode and decode data.
RSA's encryption products use two keys.
If a person X wants to receive encrypted files or e-mail, he has a public key and a private key, each one a number one hundred or more digits long, linked by the encryption algorithm. Person X can give the public key to anyone who wants to send him coded information. It can remain public knowledge, because it cannot be used to decode messages encrypted for X.
For that, the private key is needed, and only X posesses it.
Alternately, X can use his private key to encode a document, such as a contract, and send it to someone who knows his public key. Using the public key, the recipient can open the encrypted message. In addition X could send two versions of a document, one scrambled and one unscrambled. If they match when opened, it guarantees that the documents have not been tampered with en route.
Thus RSA encryption systems not only hide data from prying eyes, they can be used to authenticate the identity of a sender and to verify the integrity of transmitted data.
The technology could also be used to prevent snoopers from eavesdropping on cell phone calls and other digital communications.
RSA Data Security pioneered and marketed the technology that makes it possible to communicate and transfer information and documents securely on the Internet and establish and authenticate the identity of virtual trading partners—developments essential to the widespread acceptance of electronic commerce.
RSA encryption products almost proved too successful.
Bookmarks