X-Nico

unusual facts about RSA


Side channel attack

In the case of RSA decryption with secret exponent d and corresponding encryption exponent e and modulus m, the technique applies as follows (for simplicity, the modular reduction by m is omitted in the formulas): before decrypting; that is, before computing the result of y^d for a given ciphertext y, the system picks a random number r and encrypts it with public exponent e to obtain r^e.


Adi Shamir

He is a co-inventor of the RSA algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identification scheme (along with Uriel Feige and Amos Fiat), one of the inventors of differential cryptanalysis and has made numerous contributions to the fields of cryptography and computer science.

Alcohol server training

The type of training delivery allowed also varies between states, with states such as Queensland, Western Australia and South Australia and Northern Territory, accepting online delivery of the National RSA training, while Victoria and do not currently recognise online as a valid delivery channel for this type of training.

Calum Colvin

Calum Colvin RSA OBE (born Glasgow, 1961) is a Scottish artist whose work combines photography, painting, and installation, and often deals with issues of Scottish identity and culture and with the history of art.

Claus P. Schnorr

He received, with Jean-Jacques Quisquater, the RSA Award for Excellence in Mathematics in 2013.

Clifford Cocks

He invented the widely used encryption algorithm now commonly known as RSA, about three years before it was independently developed by Rivest, Shamir, and Adleman at MIT.

CyaSSL

CTaoCrypt Provides RSA, DSS, Diffie–Hellman, EDH, NTRU, DES, Triple DES, AES (CBC, CTR, CCM, GCM), Camellia, ARC4, HC-128, MD2, MD4, MD5, SHA-1, SHA-2, BLAKE2, RIPEMD-160, Random Number Generation, Large Integer support, and base 16/64 encoding/decoding.

EMV

The use of a PIN and cryptographic algorithms such as DES, Triple-DES, RSA and SHA provide authentication of the card to the processing terminal and the card issuer's host system.

George Bax Holmes

Bax Holmes is perhaps best known for his discovery of the Great Horsham Iguanodon, a plant eating dinosaur, in building works on the future site of the Royal & Sun Alliance (now RSA) headquarters.

Isaac Dogboe

He qualified winning silver in the African Olympic Qualifying Event beating Mohamed Bedir (EGY), Emilian Polino (TAN), Ayabonga Sonjica (RSA) and only losing on countback after a 6:6 draw in the final to Aboubakr Lbida (MAR).

John Hinsdale

This enthusiasm led him to MIT where he majored in computer science and conducted research in cryptography under professor Ronald L. Rivest (the "R" of RSA), taking a bachelor's degree in computer science in 1986, and then on to Columbia University, taking a master's degree, also in computer science, in 1995.

LiteManager

When encrypting traffic between local and remote PCs, LiteManager employs existing security algorithms and standards: 2048-bit RSA and 256-bit AES keys.

Oblivious transfer

The protocol of Even, Goldreich, and Lempel (which the authors attribute partially to Silvio Micali), is general, but can be instantiated using RSA encryption as follows.

Remote Audio Output Protocol

The RSA public key stored in iTunes was extracted by Jon Lech Johansen, enabling third-party software to stream music to an Airport Express.

Remote Utilities

When encrypting traffic between local and remote PCs, Remote Utilities employs existing security algorithms and standards: 2048-bit RSA and 256-bit AES keys.

Rhetoric Society of America

The RSA was established in 1968, by directors that included Edward P. J. Corbett, Wayne C. Booth and Richard Hughes, introducing innovative programs and courses in rhetoric.

Rock Phish

This report that calls them the Rock Phish gang comes from a research firm known as Gartner, supported by RSA.

RSA problem

The structure of the RSA public key requires that N be a large semiprime (i.e., a product of two large prime numbers), that 2 < e < N, that e be coprime to φ(N), and that 0 ≤ C < N.

Ryan Lackey

He also speaks at numerous conferences and trade shows, including DEF CON, RSA Data Security Conference, on various topics in the computer security field, and has appeared on the cover of Wired Magazine, in numerous television, radio, and print articles on HavenCo and Sealand.

Scrambler

It was the need to synchronize the scramblers that suggested to James H. Ellis the idea for non-secret encryption which ultimately led to the invention of both the RSA encryption algorithm and Diffie-Hellman key exchange well before either was reinvented publicly by Rivest, Shamir, and Adleman, or by Diffie and Hellman.

TeamDrive

Data transfers between TeamDrive's servers and version ≥3.0 of their client program uses 3072-bit RSA key pairs generated by the OpenSSL cryptographic library.

TeamViewer

TeamViewer uses RSA private/public key exchange (2048-bit) and AES (256-bit) session encryption.

Texas Instruments signing key controversy

The Texas Instruments signing key controversy refers to the controversy which resulted from Texas Instruments' (TI) response to a project to factorize the 512-bit RSA cryptographic keys needed to write custom firmware to TI devices.

Timing attack

In 2003, Boneh and Brumley demonstrated a practical network-based timing attack on SSL-enabled web servers, based on a different vulnerability having to do with the use of RSA with Chinese remainder theorem optimizations.


see also