RSA ENCRYPTION

its importance and use in current systems

Authors

DOI:

https://doi.org/10.31510/infa.v21i1.1891

Keywords:

RSA, Cryptography, Information security

Abstract

With the increasing advancement of the digitalization of sensitive information and the increase in cyber threats, it is essential to master robust cryptographic techniques, such as RSA (Rivest-Shamir-Adleman). This is necessary and even more evident in a pandemic and post-pandemic context, in which we have seen a significant increase in cyberattack, data leaks and ransomware incidents. The ability to protect sensitive data will not only strengthen customer trust, but also ensure compliance with strict data privacy regulations such as LGPD (Brazilian General Personal Data Protection Law). This compliance, in turn, consolidates the competitive position in the global market. Based on this evidence and, through bibliographical research in the area, as well as opinions from security institutions and reputable authors, this article was then developed. Throughout it, topics such as what the RSA algorithm is, its security and its effectiveness today will be discussed. It is expected that this article can contribute to demonstrating the importance of RSA in information encryption.

Downloads

Metrics

PDF views
29
Jan 28 '25Jan 31 '25Feb 01 '25Feb 04 '25Feb 07 '25Feb 10 '25Feb 13 '25Feb 16 '25Feb 19 '25Feb 22 '25Feb 25 '254.0
|

References

BARKER, E. NIST SP 800-57: Recommendation for key management: Part1-Geral. 158. ed. Gaithersburg: NIST, Maio 2020. Disponível em: <https://csrc.nist.gov/pubs/sp/800/57/pt1/r5/final>. Acesso em: 26 set. 2023.

BINANCE ACADEMY. Encriptação Simétrica vs. Assimétrica. Binance Academy. 2020. Disponível em: <https://www.binance.vision/pt/security/symmetric-vs-asymmetric-encryption>. Acesso em: 31 mai. 2023.

CISO ADVISOR. Metade dos sites ainda usa chaves criptográficas legadas. , 10 dez. 2021. Disponível em: <https://www.cisoadvisor.com.br/metade-dos-sites-ainda-usa-chaves-criptograficas-legadas/>. Acesso em: 9 dez. 2023.

COUTINHO. S. C. Criptografia. Rio de Janeiro: IMPA, 2015, 217 p. Disponível em: <https://www.obmep.org.br/docs/apostila7.pdf>. Acesso em: 24 ago. 2023.

GAUDRY, P.; GUILLEVIC, A.; HENINGER, N.; THOMÉ, E.; ZIMMERMANN, P. Factorization of RSA-250. 28 fev. 2020. Disponível em: <https://sympa.inria.fr/sympa/arc/cado-nfs/2020-02/msg00001.html>. Acesso em: 10 nov. 2023.

LEYDEN, J. RSA poses $200,000 crypto challenge. 25 jul. 2001. Disponível em: <https://www.theregister.com/2001/07/25/rsa_poses_200_000_crypto/>. Acesso em: 8 nov. 2023.

MACEDO, S. Smartphone é, cada vez mais, dominante no acesso à internet. Folha de São Paulo, 25 jul. 2022. Disponível em: <https://www1.folha.uol.com.br/tec/2022/07/smartphone-e-cada-vez-mais-dominante-no-acesso-a-internet.shtml>. Acesso em: 2 fev. 2024.

MALETSKY, K. RSA vs. ECC Comparison for Embedded Systems. A. ed. rev. Microchip Technology Incorporated, 2020. 6 p. ISBN 978-1-5224-5997-2. Disponível em: <https://ww1.microchip.com/downloads/en/DeviceDoc/00003442A.pdf>. Acesso em: 5 fev. 2024.

MICROSOFT. Microsoft Teams. 2017. Disponível em: <https://teams.microsoft.com/>. Acesso em: 6 out. 2023.

NORDVPN. What is RSA encryption, and how does it work?. 31 dez. 2022. Disponível em: <https://nordvpn.com/pt-br/blog/rsa-encryption/>. Acesso em: 16 jan. 2024.

NOVAGEO SOLUTIONS. O que é a Criptografia Assimétrica RSA: algoritmo de chave assimétrica?. 4 ago. 2022. Disponível em: <https://www.novageo.pt/novageo/displayArticles?numero=38346&_que__criptografia_assimetrica_rsa_algoritmo_chave_assimetrica_>. Acesso em: 10 jan. 2024.

OLIVEIRA, I. Levantamento mostra que ataques cibernéticos no Brasil cresceram 94%. CNN, 19 ago. 2022. Disponível em: <https://www.cnnbrasil.com.br/tecnologia/levantamento-mostra-que-ataques-ciberneticos-no-brasil-cresceram-94/>. Acesso em: 12 out. 2023.

RASTOGI, A. What is the best encryption strategy for protecting your data?. [S. l.]: Encryption Consulting, 7 set. 2023. Disponível em: <https://www.encryptionconsulting.com/what-is-the-best-encryption-strategy-for-protecting-your-data/>. Acesso em: 4 mar. 2024.

RAY, D. Online RSA Encryption, Decryption And Key Generator Tool(Free). 2018. Disponível em: <https://www.devglan.com/online-tools/rsa-encryption-decryption>. Acesso em: 20 out. 2023.

RAY, D. RSA Encryption and Decryption in Java. Devglan, 10 mar. 2018. Disponível em: <https://www.devglan.com/java8/rsa-encryption-decryption-java>. Acesso em: 14 fev. 2024.

UFSM. Introdução à Criptografia. 5 maio 2020. Disponível em: <https://www.ufsm.br/pet/sistemas-de-informacao/2020/05/05/introducao-a-criptografia>. Acesso em: 8 mar. 2024.

Published

2025-01-28

How to Cite

ARAVÉCHIA, L. S.; DIAN, M. de O. RSA ENCRYPTION: its importance and use in current systems. Revista Interface Tecnológica, Taquaritinga, SP, v. 21, n. 1, p. 100–112, 2025. DOI: 10.31510/infa.v21i1.1891. Disponível em: https://revista.fatectq.edu.br/interfacetecnologica/article/view/1891. Acesso em: 15 mar. 2025.

Issue

Section

Tecnologia em Informática
Crossref
0
Scopus
0
Views
  • Abstract 64
  • PDF (Português (Brasil)) 29
Métricas