Browse Definitions :
Definition

RSA Security

RSA Security is a United States-based organization that creates encryption, network and computer security products.

Ron Rivest Adi Shamir, and Len Adleman founded RSA as an independent company in 1982. RSA derives from the initials of each of the founders names. RSA was acquired by EMC Corporation in 2006 and operates as a corporate division of that company. RSA headquarters are in Bedford, Massachusetts; the company also maintains satellite offices in Australia, China, Hong Kong, India, Ireland, Israel, Japan, the United Kingdom and Singapore.

RSA products:
RSA makes the public key infrastructure (PKI) encryption standards by which much of the Internet’s secure communication are run. Other RSA products include hardware tokens, software tokens, SecurID, Besafe and enVision.

RSA encryption is based on use of a public and a private key. Typically a key fob (such as an RSA SecurID security token) is used by employees in security-sensitive companies. The token generates a public key that changes every minute. This string is combined with a user’s password to make a hybrid one-time use password.

On secure websites, a digital certificate with the public key is made publicly available. The private key is never sent over the Internet and is used to decrypt text that is encrypted with the public key. The senders’s identity can also be verified using the public key. Both of these keys are created at the same time by the RSA algorithm.

RSA controversy:
In December 2013, Reuters reported that the RSA had accepted a 10 million dollar payment to place a backdoor for the NSA in their Dual Elliptic Curve random number generation system. In interview, the company’s chief technologist, Sam Curry, declined to answer whether that allegation was true. The NSA actively promoted the compromised security product in its role as security consultants. Reuters also reported that the company’s website security tool Extended Random made the seemingly strong encryption 10,000 times faster for the NSA to crack.

This was last updated in July 2014

Continue Reading About RSA Security

Networking
Security
  • PCI DSS 12 requirements

    The PCI DSS 12 requirements are a set of security controls businesses must implement to protect credit card data and comply with ...

  • cardholder data (CD)

    Cardholder data (CD) is any personally identifiable information (PII) associated with a person who has a credit or debit card.

  • PCI DSS merchant levels

    Payment Card Industry Data Security Standard (PCI DSS) merchant levels rank merchants based on their number of transactions per ...

CIO
  • systems thinking

    Systems thinking is a holistic approach to analysis that focuses on the way that a system's constituent parts interrelate and how...

  • crowdsourcing

    Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.

  • synthetic data

    Synthetic data is information that's artificially manufactured rather than generated by real-world events.

HRSoftware
  • employee engagement

    Employee engagement is the emotional and professional connection an employee feels toward their organization, colleagues and work.

  • talent pool

    A talent pool is a database of job candidates who have the potential to meet an organization's immediate and long-term needs.

  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

Customer Experience
  • needs assessment

    A needs assessment is a systematic process that examines what criteria must be met in order to reach a desired outcome.

  • customer touchpoint

    A customer touchpoint is any direct or indirect contact a customer has with a brand.

  • customer service charter

    A customer service charter is a document that outlines how an organization promises to work with its customers along with ...

Close