A method for obtaining digital signatures and public-key cryptosystems

Article Properties
  • Language
    English
  • Publication Date
    1978/02/01
  • Indian UGC (Journal)
  • Refrences
    14
  • Citations
    4,517
  • R. L. Rivest MIT Lab. for Computer Science and Department of Mathematics, Cambridge, MA
  • A. Shamir MIT Lab. for Computer Science and Department of Mathematics, Cambridge, MA
  • L. Adleman MIT Lab. for Computer Science and Department of Mathematics, Cambridge, MA
Abstract
Cite
Rivest, R. L., et al. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”. Communications of the ACM, vol. 21, no. 2, 1978, pp. 120-6, https://doi.org/10.1145/359340.359342.
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126. https://doi.org/10.1145/359340.359342
Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 1978;21(2):120-6.
Journal Categories
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Computer software
Technology
Electrical engineering
Electronics
Nuclear engineering
Electronics
Computer engineering
Computer hardware
Description

Revolutionizing secure communication, this paper presents a groundbreaking encryption method enabling digital signatures and public-key cryptosystems. Its novel property is publicly revealing an encryption key does not reveal the corresponding decryption key. The method allows secure message encryption using a publicly revealed key, decipherable only by the intended recipient with the corresponding private key. Messages can be "signed" using the private key, verifiable by anyone with the public key, preventing forgery or denial. Encryption involves raising a message representation (M) to a public power (e) and finding the remainder after division by a public product (n) of two large prime numbers (p and q). Decryption uses a different, secret power (d), with security based on the difficulty of factoring n. This breakthrough has transformed electronic communication and data security, with applications in electronic mail and funds transfer. The system's ability to provide both confidentiality and authentication has underpinned the development of modern digital infrastructure and continues to drive innovation in cryptography.

Published in Communications of the ACM, this paper presents a fundamental innovation in computer science, making it highly relevant to the journal's audience. The introduction of public-key cryptography and digital signatures has had a lasting impact on the field and is a landmark contribution to secure communication.

Refrences
Citations
Citations Analysis
The first research to cite this article was titled Study on the Improvement of ELGamal Cryptosystem Based on Elliptic Curve and was published in 1969. The most recent citation comes from a 2024 study titled Study on the Improvement of ELGamal Cryptosystem Based on Elliptic Curve . This article reached its peak citation in 2022 , with 339 citations.It has been cited in 1,029 different journals, 12% of which are open access. Among related journals, the IEEE Access cited this research the most, with 112 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year