Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is RSA

Cryptographic Security Solutions for the Internet of Things
Rivest–Shamir–Adleman.
Published in Chapter:
Encryption Principles and Techniques for the Internet of Things
Kundankumar Rameshwar Saraf (Dr. D. Y. Patil College of Engineering Lohegaon, India) and Malathi P. Jesudason (Dr. D. Y. Patil College of Engineering Akurdi, India)
Copyright: © 2019 |Pages: 25
DOI: 10.4018/978-1-5225-5742-5.ch002
Abstract
This chapter explores the encryption techniques used for the internet of things (IoT). The security algorithm used for IoT should follow many constraints of an embedded system. Hence, lightweight cryptography is an optimum security solution for IoT devices. This chapter mainly describes the need for security in IoT, the concept of lightweight cryptography, and various cryptographic algorithms along with their shortcomings given IoT. This chapter also describes the principle of operation of all the above algorithms along with their security analysis. Moreover, based on the algorithm size (i.e., the required number of gate equivalent, block size, key size, throughput, and execution speed of the algorithm), the chapter reports the comparative analysis of their performance. The chapter discusses the merits and demerits of these algorithms along with their use in the IoT system.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Performance Analysis of Mail Clients on Low Cost Computer With ELGamal and RSA Using SNORT
RSA provides industry-wide security solutions for superior threat detection and cyber incident reaction, discovery, and access management.
Full Text Chapter Download: US $37.50 Add to Cart
Ransomware: A New Cyber Hijacking Threat to Enterprises
A cryptology algorithm for public-key encryption. It was the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure, given sufficiently long keys and the use of up-to-date implementations.
Full Text Chapter Download: US $37.50 Add to Cart
A Novel Secure Routing Protocol in MANET
A popular cryptography algorithm which was proposed by Rivest, Shamir, and Adleman in 1978. This algorithm uses two keys, public and private. Source node encrypts message using its public key and destination node decrypts that ciphertext message using its private key.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR