0% found this document useful (0 votes)
9 views

RSA REPORTING Updated

The RSA security algorithm was created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. It is an asymmetric cryptographic algorithm that is widely used for secure communication, digital signatures, and encryption. The algorithm works by using a public key for encryption and a private key for decryption such that only someone with the private key can decrypt a message encrypted with the public key. Some applications of RSA include encrypting emails, securing web browsing with HTTPS, and creating digital signatures.

Uploaded by

Sweety Mitchy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

RSA REPORTING Updated

The RSA security algorithm was created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. It is an asymmetric cryptographic algorithm that is widely used for secure communication, digital signatures, and encryption. The algorithm works by using a public key for encryption and a private key for decryption such that only someone with the private key can decrypt a message encrypted with the public key. Some applications of RSA include encrypting emails, securing web browsing with HTTPS, and creating digital signatures.

Uploaded by

Sweety Mitchy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

RSA

SECURITY
ALGORITHM
P R E S E N T E D B Y:
BANTILO, BEJAR,
CORDA, DERIGE,
EUGENIO, PILOR

D
AGENDAS:
● What is RSA Security Algorithm?

● What application for RSA Security Algorithm?

● How does the RSA Security Algorithm work?

D
W H AT I S R S A
S TA N D F O R ?
C
WHO CREATED THE
RSA SECURITY ALGORITHM?

C
RON RIVEST

Ron Rivest is an
American cryptographer
and computer scientist
born on May 6, 1947. He
is a professor at the
Massachusetts Institute
o f Te c h n o l o g y ( M I T )

P
ADI SHAMIR

Adi Shamir is an Israeli


cryptographer and computer
scientist born on July 6,
1952. He is a professor at
t h e We i z m a n n I n s t i t u t e o f
Science in Israel.

B
LEONARD
ADLEMAN
Leonard Adleman is an
American computer scientist
and biologist born on
December 31, 1945. He is a
professor at the University of
Southern California (USC) and
is known for his work at the
intersection of computer
s c i e n c e a n d m o l e c u l a r b i o l o g y.

B
RSA IS?

A widely used in various applications,


including secure communication over
the internet (e.g., HTTPS for secure
web browsing), digital signatures for
verifying the authenticity of messages
or documents, and as a key exchange
mechanism in secure protocols.
E
Is RSA Algorithm Asymmetric

The term "public-key cryptography"


also refers to asymmetric encryption.
The key generation algorithm of an
asymmetric encryption system creates
a public key for data encryption and a
private key for data decryption.

D
Exam pl e A ppl i c at i on
O f RSA Se c ur i t y
Al gor i t hm
B
1. S e c u r e D a t a T r a n s m i s s i o n :

• Email Encryption: RSA can be used to encrypt


email messages and attachments, ensuring that
only the intended recipient with the private
key can decrypt and read the content.

• Secure Chat Applications: Messaging apps like


WhatsApp and Signal use RSA encryption to
secure the messages exchanged between users.

• Secure File Tr ansfer: RSA can be employed to


encrypt files before sending them over the
internet, ensur ing that only authorized parties
can access the files.
E
2. Secure Web Communication:

• HTTPS: RSA is used in the SSL/TLS


protocol to secure communication between
web browsers and websites. It encrypts
data transmitted over the internet,
including login credentials, credit card
information, and other sensitive data.

P
3. Digital Signatures:

• RSA is used to create digital signatures,


which help verify the authenticity and
integrity of digital documents, software, and
messages. Digital signatures are widely used
in various applications, including:

• Document Signing: Sign PDFs, contracts,


and other digital documents to prove their
authenticity.
• Software Distribution: Ve r i f y that
software updates and downloads haven't
been tampered with.
• Financial Transactions: Authenticate
transactions in online banking and e-
commerce.
B
H O W R SA
SECURI TY
ALG O R I TH M S
WO R K S?
B
REFEREN
CE:

PLEASE INDICATE THE YOUTUBE LINK HERE-

You might also like