Browse Definitions:
Definition

RSA Security

Contributor(s): Matthew Haughn

RSA Security is a United States-based organization that creates encryption, network and computer security products.

Ron Rivest Adi Shamir, and Len Adleman founded RSA as an independent company in 1982. RSA derives from the initials of each of the founders names. RSA was acquired by EMC Corporation in 2006 and operates as a corporate division of that company. RSA headquarters are in Bedford, Massachusetts; the company also maintains satellite offices in Australia, China, Hong Kong, India, Ireland, Israel, Japan, the United Kingdom and Singapore.

RSA products:
RSA makes the public key infrastructure (PKI) encryption standards by which much of the Internet’s secure communication are run. Other RSA products include hardware tokens, software tokens, SecurID, Besafe and enVision.

RSA encryption is based on use of a public and a private key. Typically a key fob (such as an RSA SecurID security token) is used by employees in security-sensitive companies. The token generates a public key that changes every minute. This string is combined with a user’s password to make a hybrid one-time use password.

On secure websites, a digital certificate with the public key is made publicly available. The private key is never sent over the Internet and is used to decrypt text that is encrypted with the public key. The senders’s identity can also be verified using the public key. Both of these keys are created at the same time by the RSA algorithm.

RSA controversy:
In December 2013, Reuters reported that the RSA had accepted a 10 million dollar payment to place a backdoor for the NSA in their Dual Elliptic Curve random number generation system. In interview, the company’s chief technologist, Sam Curry, declined to answer whether that allegation was true. The NSA actively promoted the compromised security product in its role as security consultants. Reuters also reported that the company’s website security tool Extended Random made the seemingly strong encryption 10,000 times faster for the NSA to crack.

This was last updated in July 2014

Continue Reading About RSA Security

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

Dateiendungen und Dateiformate

Gesponsert von:

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close