RSA algorithm/Related Articles
Jump to navigation
Jump to search
- See also changes related to RSA algorithm, or pages that link to RSA algorithm or to this page or whose text contains "RSA algorithm".
Parent topics
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Asymmetric key cryptography [r]: A category of cryptographic techniques, which greatly simplify key management, which are based on mathematically related key pairs, such that the "public" key can be used to encrypt and be freely available, and only the holder of the "private" key can decrypt the message [e] -->
Subtopics
- Attacks on RSA [r]: Methods for attacking the Rivest, Shamir and Adleman public-key cryptography algorithm. [e]
- Digital signature [r]: A technique based on public key cryptography to allow people to "sign" documents using their private keys. [e]
- Integer factorisation [r]: Add brief definition or description
- Ron Rivest [r]: Cryptographer who teaches at MIT, co-inventor of the RSA algorithm, the most widely used public key encryption technique. [e]
- Adi Shamir [r]: Cryptographer who teaches at the Weizmann Institute in Israel. [e]
- Leonard Adleman [r]: Add brief definition or description
- Virtual memory [r]: A concept in computer science whereby an operating system can use alternate (usually slower) data storage to impersonate real memory and run programs that ordinarily would not fit into real memory (RAM) [e]
- Four color theorem [r]: (A famous mathematical statement with a long history) For every planar graph, four colors suffice to color its vertices in such a way that adjacent vertices have different colors. [e]
- Hybrid cryptosystem [r]: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]