Rivest Shamir Adelman Key Encryption Algorithm

Show Summary Details

Quick Reference

The major public key encryption algorithm currently used on the vast majority of networks. The algorithm is symmetric in that its public key can be used for decrypting messages produced using its private key and vice versa. The key for this algorithm consists of two integers. It is used in conjunction with other algorithms such as Message Digest 5 and Secure Hash Algorithm 1 for digital signatures. It is also used to transmit keys employed in symmetric key encryption prior to the keys being used.

Subjects: Computing.

Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.