Also found in: Dictionary, Thesaurus, Medical, Financial, Acronyms, Wikipedia.


(cryptography, company)
(The initials of the authors)

1. RSA Data Security, Inc.

2. Their cryptography systems, especially RSA encryption.

The RSA algorithm was first described in the paper:

[R. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystems". CACM 21,2; 1978]


(1) (Rural Service Area) See MSA.

(2) (Rivest-Shamir-Adleman) A highly secure cryptography method by RSA Security, Inc., Bedford, MA (, a division of EMC Corporation since 2006. It uses a two-part key. The private key is kept by the owner; the public key is published.

Data are encrypted by using the recipient's public key, which can only be decrypted by the recipient's private key. RSA is very computation intensive, thus it is often used to create a digital envelope, which holds an RSA-encrypted DES key and DES-encrypted data. This method encrypts the secret DES key so that it can be transmitted over the network, but encrypts and decrypts the actual message using the much faster DES algorithm.

RSA is also used for authentication by creating a digital signature. In this case, the sender's private key is used for encryption, and the sender's public key is used for decryption. See digital signature.

The RSA algorithm is also implemented in hardware. As RSA chips get faster, RSA encoding and decoding add less overhead to the operation. See cryptography and digital certificate.

Secret Key Vs. Public Key
The secret method uses the same key to encrypt and decrypt. The problem is transmitting the key to someone so they can use it. The public key method uses two keys. One kept secret and never transmitted, and the other made public. Sometimes the public key method is used to send the secret key of the private method, and then the message is sent using the private key method.
References in periodicals archive ?
The RSA SecurID system is the world's most widely used two-factor user authentication solution.
Application for a grant CAN ONLY be made online at the RSA website:
The company's RSA BSAFE(R) line of encryption-based security technologies is used by commercial software vendors and in-house developers to secure applications for e-commerce and services over the Internet, enterprise security, wireless communications, digital cable television and other uses.
IRI has had a long history of cooperation and affiliation among state VR agencies, RSA, universities, and community rehabilitation programs.
And when that pledge was threatened by last minute legislation in Albany, the RSA lobbied a resolution which knocked the proposed rate increase down from 31 cents per hundred dollars of assessed value to just two and one-half cents.
The RSA Secured Partner Program is one of the oldest and largest alliance programs of its type, bringing over twelve years of experience and hundreds of complementary solutions together.
The RSA and CSAVR Streamlining Initiative represents a joint commitment to ensuring a clear focus on quality employment outcomes for people with disabilities.
Membership: Membership in the RSA is open to all owners or managers of multi-family rental housing.
From 1970 to 1973, the Pima Indians on the Gila River Reservation, south of Phoenix, were recipients of an RSA Innovation and Expansion Grant along with the subsequent Arizona RSA Establishment Grants.
Available now, the Diversinet Provisioning Server for the RSA SecurID solution is interoperable with RSA([R]) Authentication Manager, the management component that powers the RSA SecurID solution.
The RSA SecurID enabled authentication capabilities will be added to an already rich set of plusID communication protocols that allow plusID to be used with organizations' existing physical and logical (IT) security infrastructure.
RSA Conference is helping drive the security agenda worldwide with annual events in the U.