Summary:
RSA encryption works by essentially placing a lock on a file. The file can then be stored or transferred as needed. In order to access the file a request for a key that opens the lock on the file must be entered. The key is created by a prime factorization, or multiplication of two large prime numbers to generate a seemingly random number. The number generated by prime factorization works as the public key, and the prime numbers themselves work as the private key. When done correctly, it is almost impossible to determine the original prime numbers that are utilized in the prime factorization even for modern supercomputers. If your primary concern is to control access to data then RSA encryption is a secure solution for distributed data.
Key Points:
- RSA encryption can be utilized by organization and individuals who wish to control who can have access to data.
- It use prime factorization to general a unique key code to serve a public key.
- The prime numbers that are used serve as the private key.
- This private key can control access and getting the correct prime numbers is currently something that not even modern supercomputer can achieve.