Results 1 to 4 of 4

Thread: RSA Algorithm for Data Security

  1. #1
    Join Date
    Feb 2009
    Posts
    64

    RSA Algorithm for Data Security

    hie friends,

    Anyone associated with cryptography or data security, I want to know about RSA algorithm in data security. Can some of you provide me the useful information regarding this algorithm ?

    thnx a lot

  2. #2
    Join Date
    Feb 2008
    Posts
    1,852

    Re: RSA Algorithm for Data Security

    RSA algorithm is the most traditional and widely used aldorithm for data security.

    First, lets go through the history of RSA algorithm

    Ron Rivest, Adi Shamir and Leonard Adleman developed the RSA encryption algorithm in 1977. They founded RSA Data Security in 1982.

    In 1995 RSA sent a handful of people across the hall to found Digital Certificates International (better known as VeriSign).

    The company then called Security Dynamics acquired RSA Data Security in July 1996 and DynaSoft AB in 1997.

    In January 1997 it proposed the first of the DES Challenges which led to the first public breaking of a message based on the Data Encryption Standard.
    In February 2001, it acquired Xcert International, Inc., a privately held company that developed and delivered digital certificate-based products for securing e-business transactions.

    In May 2001, it acquired 3-G International, Inc., a privately held company that developed and delivered smart card and biometric authentication products.

    In August 2001, it acquired Securant Technologies, Inc., a privately held company that produced ClearTrust, an identity management product.

    In December 2005, it acquired Cyota, a privately held company specializing in online security and anti-fraud solutions for financial institutions.

    In April 2006 it acquired PassMark Security

    On June 29, 2006 it was announced that EMC Corporation will acquire RSA Security for $2.1 billion.

    On September 14, 2006 RSA stockholders approved the acquisition of the company by EMC Corporation

    On 2007 RSA acquired Valyd Software, a Hyderabad based Indian company specializing in File and Data Security .

  3. #3
    Join Date
    May 2008
    Posts
    2,389

    Re: RSA Algorithm for Data Security

    RSA Technique
    RSA's security systems are based on a mathematical theory for public-key encryption, which encodes data using formulas called algorithms. Public-key encryption represented a huge step beyond earlier encryption systems, which relied on a single "key" to encode and decode data.

    RSA's encryption products use two keys.
    If a person X wants to receive encrypted files or e-mail, he has a public key and a private key, each one a number one hundred or more digits long, linked by the encryption algorithm. Person X can give the public key to anyone who wants to send him coded information. It can remain public knowledge, because it cannot be used to decode messages encrypted for X.
    For that, the private key is needed, and only X posesses it.

    Alternately, X can use his private key to encode a document, such as a contract, and send it to someone who knows his public key. Using the public key, the recipient can open the encrypted message. In addition X could send two versions of a document, one scrambled and one unscrambled. If they match when opened, it guarantees that the documents have not been tampered with en route.
    Thus RSA encryption systems not only hide data from prying eyes, they can be used to authenticate the identity of a sender and to verify the integrity of transmitted data.

  4. #4
    Join Date
    May 2008
    Posts
    2,389

    Re: RSA Algorithm for Data Security

    The technology could also be used to prevent snoopers from eavesdropping on cell phone calls and other digital communications.

    RSA Data Security pioneered and marketed the technology that makes it possible to communicate and transfer information and documents securely on the Internet and establish and authenticate the identity of virtual trading partners—developments essential to the widespread acceptance of electronic commerce.

    RSA encryption products almost proved too successful.

Similar Threads

  1. WLAN security threat with data thief
    By Algernon in forum Networking & Security
    Replies: 4
    Last Post: 15-02-2011, 07:43 PM
  2. Best backup software with data security at no cost
    By Esmel in forum Windows Software
    Replies: 3
    Last Post: 14-12-2010, 12:50 PM
  3. DES ALGORITHM in C Language
    By sayanmaji in forum Software Development
    Replies: 2
    Last Post: 21-03-2010, 11:23 AM
  4. DNS client implementation with data security
    By Abhibhava in forum Networking & Security
    Replies: 5
    Last Post: 02-02-2010, 09:02 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,750,365,486.52030 seconds with 16 queries