HomeTechnologyCybersecurityWhat is RSA?
Technology·2 min·Updated Mar 9, 2026

What is RSA?

Rivest-Shamir-Adleman

Quick Answer

A widely used encryption method, RSA stands for Rivest-Shamir-Adleman, named after its inventors. It secures data by using a pair of keys, one public and one private, to encrypt and decrypt messages.

Overview

RSA is a type of public key cryptography that allows secure data transmission over the internet. It works by generating two keys: a public key that anyone can use to encrypt a message and a private key that only the recipient has to decrypt that message. This method ensures that even if someone intercepts the encrypted message, they cannot read it without the private key. The security of RSA relies on the mathematical difficulty of factoring large numbers. When you create an RSA key pair, you choose two large prime numbers and multiply them together. The product forms part of the public key, while the two primes are kept secret as part of the private key. For example, if Alice wants to send a secure message to Bob, she encrypts it with Bob's public key, and only Bob can decrypt it using his private key. RSA is crucial for protecting sensitive information in various online activities, such as online banking and shopping. When you see a padlock symbol in your web browser, it often indicates that RSA is being used to secure the connection. This technology helps keep personal data safe from hackers and ensures that communications remain private.


Frequently Asked Questions

RSA is considered secure as long as the keys are long enough. Typically, a key length of at least 2048 bits is recommended to withstand current computational power.
One limitation of RSA is that it is slower than some other encryption methods, especially for encrypting large amounts of data. Additionally, if the private key is compromised, the security of the entire system is at risk.
Yes, RSA can be used for creating digital signatures, which verify the authenticity of a message or document. The sender creates a signature using their private key, and anyone can verify it using the sender's public key.