Part of the Security management glossary:

RSA Security is a United States-based organization that creates encryption, network and computer security products.

Ron Rivest Adi Shamir, and Len Adleman founded RSA as an independent company in 1982. RSA derives from the initials of each of the founders names. RSA was acquired by EMC Corporation in 2006 and operates as a corporate division of that company. RSA headquarters are in Bedford, Massachusetts; the company also maintains satellite offices in Australia, China, Hong Kong, India, Ireland, Israel, Japan, the United Kingdom and Singapore.

RSA products:
RSA makes the public key infrastructure (PKI) encryption standards by which much of the Internet’s secure communication are run. Other RSA products include hardware tokens, software tokens, SecurID, Besafe and enVision.

RSA encryption is based on use of a public and a private key. Typically a key fob (such as an RSA SecurID security token) is used by employees in security-sensitive companies. The token generates a public key that changes every minute. This string is combined with a user’s password to make a hybrid one-time use password.

On secure websites, a digital certificate with the public key is made publicly available. The private key is never sent over the Internet and is used to decrypt text that is encrypted with the public key. The senders’s identity can also be verified using the public key. Both of these keys are created at the same time by the RSA algorithm.

RSA controversy:
In December 2013, Reuters reported that the RSA had accepted a 10 million dollar payment to place a backdoor for the NSA in their Dual Elliptic Curve random number generation system. In interview, the company’s chief technologist, Sam Curry, declined to answer whether that allegation was true. The NSA actively promoted the compromised security product in its role as security consultants. Reuters also reported that the company’s website security tool Extended Random made the seemingly strong encryption 10,000 times faster for the NSA to crack.

This was last updated in July 2014
Contributor(s): Matthew Haughn
Posted by: Margaret Rouse

Related Terms

Definitions

  • Types of enterprise risk

    - An enterprise risk is any potential event that could threaten an organization's ability to achieve its financial goals; long term, a risk can be a threat to sustainability. In a business context, r... (WhatIs.com)

  • business risk

    - A risk, in a business context, is anything that threatens an organization's ability to generate profits at its target levels. Business risks are broadly categorized as pure risks, which are negativ... (WhatIs.com)

  • pay for privacy

    - Pay for privacy is a business model in which customers are charged a fee to ensure that their data will not be shared and is secure from third-party access. In some contexts, a pay for privacy serv... (WhatIs.com)

Glossaries

  • Security management

    - Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorizati...

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.