Browse Definitions :
Definition

RSA Security

RSA Security is a United States-based organization that creates encryption, network and computer security products.

Ron Rivest Adi Shamir, and Len Adleman founded RSA as an independent company in 1982. RSA derives from the initials of each of the founders names. RSA was acquired by EMC Corporation in 2006 and operates as a corporate division of that company. RSA headquarters are in Bedford, Massachusetts; the company also maintains satellite offices in Australia, China, Hong Kong, India, Ireland, Israel, Japan, the United Kingdom and Singapore.

RSA products:
RSA makes the public key infrastructure (PKI) encryption standards by which much of the Internet’s secure communication are run. Other RSA products include hardware tokens, software tokens, SecurID, Besafe and enVision.

RSA encryption is based on use of a public and a private key. Typically a key fob (such as an RSA SecurID security token) is used by employees in security-sensitive companies. The token generates a public key that changes every minute. This string is combined with a user’s password to make a hybrid one-time use password.

On secure websites, a digital certificate with the public key is made publicly available. The private key is never sent over the Internet and is used to decrypt text that is encrypted with the public key. The senders’s identity can also be verified using the public key. Both of these keys are created at the same time by the RSA algorithm.

RSA controversy:
In December 2013, Reuters reported that the RSA had accepted a 10 million dollar payment to place a backdoor for the NSA in their Dual Elliptic Curve random number generation system. In interview, the company’s chief technologist, Sam Curry, declined to answer whether that allegation was true. The NSA actively promoted the compromised security product in its role as security consultants. Reuters also reported that the company’s website security tool Extended Random made the seemingly strong encryption 10,000 times faster for the NSA to crack.

This was last updated in July 2014

Continue Reading About RSA Security

SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close