RSA ENCRYPTION
its importance and use in current systems
DOI:
https://doi.org/10.31510/infa.v21i1.1891Keywords:
RSA, Cryptography, Information securityAbstract
With the increasing advancement of the digitalization of sensitive information and the increase in cyber threats, it is essential to master robust cryptographic techniques, such as RSA (Rivest-Shamir-Adleman). This is necessary and even more evident in a pandemic and post-pandemic context, in which we have seen a significant increase in cyberattack, data leaks and ransomware incidents. The ability to protect sensitive data will not only strengthen customer trust, but also ensure compliance with strict data privacy regulations such as LGPD (Brazilian General Personal Data Protection Law). This compliance, in turn, consolidates the competitive position in the global market. Based on this evidence and, through bibliographical research in the area, as well as opinions from security institutions and reputable authors, this article was then developed. Throughout it, topics such as what the RSA algorithm is, its security and its effectiveness today will be discussed. It is expected that this article can contribute to demonstrating the importance of RSA in information encryption.
Downloads
Metrics
References
BARKER, E. NIST SP 800-57: Recommendation for key management: Part1-Geral. 158. ed. Gaithersburg: NIST, Maio 2020. Disponível em: <https://csrc.nist.gov/pubs/sp/800/57/pt1/r5/final>. Acesso em: 26 set. 2023.
BINANCE ACADEMY. Encriptação Simétrica vs. Assimétrica. Binance Academy. 2020. Disponível em: <https://www.binance.vision/pt/security/symmetric-vs-asymmetric-encryption>. Acesso em: 31 mai. 2023.
CISO ADVISOR. Metade dos sites ainda usa chaves criptográficas legadas. , 10 dez. 2021. Disponível em: <https://www.cisoadvisor.com.br/metade-dos-sites-ainda-usa-chaves-criptograficas-legadas/>. Acesso em: 9 dez. 2023.
COUTINHO. S. C. Criptografia. Rio de Janeiro: IMPA, 2015, 217 p. Disponível em: <https://www.obmep.org.br/docs/apostila7.pdf>. Acesso em: 24 ago. 2023.
GAUDRY, P.; GUILLEVIC, A.; HENINGER, N.; THOMÉ, E.; ZIMMERMANN, P. Factorization of RSA-250. 28 fev. 2020. Disponível em: <https://sympa.inria.fr/sympa/arc/cado-nfs/2020-02/msg00001.html>. Acesso em: 10 nov. 2023.
LEYDEN, J. RSA poses $200,000 crypto challenge. 25 jul. 2001. Disponível em: <https://www.theregister.com/2001/07/25/rsa_poses_200_000_crypto/>. Acesso em: 8 nov. 2023.
MACEDO, S. Smartphone é, cada vez mais, dominante no acesso à internet. Folha de São Paulo, 25 jul. 2022. Disponível em: <https://www1.folha.uol.com.br/tec/2022/07/smartphone-e-cada-vez-mais-dominante-no-acesso-a-internet.shtml>. Acesso em: 2 fev. 2024.
MALETSKY, K. RSA vs. ECC Comparison for Embedded Systems. A. ed. rev. Microchip Technology Incorporated, 2020. 6 p. ISBN 978-1-5224-5997-2. Disponível em: <https://ww1.microchip.com/downloads/en/DeviceDoc/00003442A.pdf>. Acesso em: 5 fev. 2024.
MICROSOFT. Microsoft Teams. 2017. Disponível em: <https://teams.microsoft.com/>. Acesso em: 6 out. 2023.
NORDVPN. What is RSA encryption, and how does it work?. 31 dez. 2022. Disponível em: <https://nordvpn.com/pt-br/blog/rsa-encryption/>. Acesso em: 16 jan. 2024.
NOVAGEO SOLUTIONS. O que é a Criptografia Assimétrica RSA: algoritmo de chave assimétrica?. 4 ago. 2022. Disponível em: <https://www.novageo.pt/novageo/displayArticles?numero=38346&_que__criptografia_assimetrica_rsa_algoritmo_chave_assimetrica_>. Acesso em: 10 jan. 2024.
OLIVEIRA, I. Levantamento mostra que ataques cibernéticos no Brasil cresceram 94%. CNN, 19 ago. 2022. Disponível em: <https://www.cnnbrasil.com.br/tecnologia/levantamento-mostra-que-ataques-ciberneticos-no-brasil-cresceram-94/>. Acesso em: 12 out. 2023.
RASTOGI, A. What is the best encryption strategy for protecting your data?. [S. l.]: Encryption Consulting, 7 set. 2023. Disponível em: <https://www.encryptionconsulting.com/what-is-the-best-encryption-strategy-for-protecting-your-data/>. Acesso em: 4 mar. 2024.
RAY, D. Online RSA Encryption, Decryption And Key Generator Tool(Free). 2018. Disponível em: <https://www.devglan.com/online-tools/rsa-encryption-decryption>. Acesso em: 20 out. 2023.
RAY, D. RSA Encryption and Decryption in Java. Devglan, 10 mar. 2018. Disponível em: <https://www.devglan.com/java8/rsa-encryption-decryption-java>. Acesso em: 14 fev. 2024.
UFSM. Introdução à Criptografia. 5 maio 2020. Disponível em: <https://www.ufsm.br/pet/sistemas-de-informacao/2020/05/05/introducao-a-criptografia>. Acesso em: 8 mar. 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Revista Interface Tecnológica

This work is licensed under a Creative Commons Attribution 4.0 International License.
Os direitos autorais dos artigos publicados pertencem à revista Interface Tecnológica e seguem o padrão Creative Commons (CC BY 4.0), que permite o remixe, adaptação e criação de obras derivadas do original, mesmo para fins comerciais. As novas obras devem conter menção ao(s) autor(es) nos créditos.
- Abstract 64
- PDF (Português (Brasil)) 29