Also found in: Dictionary, Thesaurus, Medical, Financial, Acronyms, Wikipedia.


(cryptography, company)
(The initials of the authors)

1. RSA Data Security, Inc.

2. Their cryptography systems, especially RSA encryption.

The RSA algorithm was first described in the paper:

[R. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital Signatures and Public-key Cryptosystems". CACM 21,2; 1978]
This article is provided by FOLDOC - Free Online Dictionary of Computing (


(1) (Rural Service Area) See MSA.

(2) (Rivest-Shamir-Adleman) A highly secure cryptography method by RSA Security, Inc., Bedford, MA (, a division of EMC Corporation since 2006. RSA uses a two-part key. The private key is kept by the owner; the public key is made available to everyone.

Data are encrypted by using the recipient's public key, which can only be decrypted by the recipient's private key. RSA is very computation intensive, thus it is often used to create a digital envelope that holds an RSA-encrypted DES key and DES-encrypted data. The RSA method encrypts the secret DES key only to transmit it over the network, but the actual message is encrypted and decrypted using the much faster DES algorithm.

RSA is also used for authentication by creating a digital signature. In this case, the sender's private key is used for encryption, and the sender's public key is used for decryption. See digital signature.

The RSA algorithm is also implemented in hardware. As RSA chips get faster, RSA encoding and decoding add less overhead to the operation. See cryptography and digital certificate.

Secret Key vs. Public Key
The secret method uses the same key to encrypt and decrypt. The problem is transmitting the key to someone so they can use it. The public key method uses two keys. One kept secret and never transmitted, and the other made public. Sometimes the public key method is used to send the secret key of the private method, and then the message is sent using the private key method.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Laurent Longuet, CEO at SirajPower said: "Our long-term partnership with RSA Global is a great achievement.
RSA Luxembourg SA's new office is located at: 40, rue de Cure, L-1368
The new capability is designed to help companies fully utilize RSA solutions to uniquely link business context with security incidents to help organizations manage risk and protect what matters most.
In an effort to understand more recent trends, Bromium ask RSA attendee if they or anyone they know had been infected with ransomware.
Additionally, the enhanced version of RSA Via Access is engineered to add new localisation capabilities, to better serve global workforces.
Insurance expert Eamonn Flanagan at Shore Capital said a takeover for RSA was now "inevitable." But he added a rival offer was still possible "from another continental European insurer." The group was the only riser on the FTSE 100 Index on Monday as takeover hopes helped it amid the global equities rout, which saw the wider top flight tumble by 4.7%.
Focusing on general insurance, RSA has around 19,000 employees and, in 2014, its net written premiums were 7.5bn.
RSA regional director for Turkey, Africa, and Middle East Ahmed Abdella said, "At RSA, we aim to help customers on their journey towards intelligence-driven security by establishing a balance between preventative controls, monitoring tools, and incident response."
RSA said a review of its Irish business found it will need to strengthen reserves by PS130m, on top of the PS70m hit identified last month after a routine internal audit uncovered a financial black hole in the division.
RSA-Talke is a joint venture between RSA Logistics, a provider of transport and logistics services headquartered in Dubai, and Talke, a German chemical logistician based in HE-rth near Cologne.
RSA Conference attracts the industry's information security leaders, the hottest new products, the highest-profile keynote speakers in information security and the most essential discussions on the latest trends and threats.