• RSA SecurID, formerly referred to as SecurID, is a mechanism developed by RSA for performing two-factor authentication for a user to a network resource...
    21 KB (2,276 words) - 18:26, 7 June 2024
  • Thumbnail for RSA Security
    public key cryptography algorithm was also named. Among its products is the SecurID authentication token. The BSAFE cryptography libraries were also initially...
    36 KB (3,678 words) - 11:01, 24 September 2024
  • Thumbnail for One-time password
    then be used to gain access to messages being sent to it. RSA Security's SecurID is one example of a time-synchronization type of token, along with HID...
    26 KB (3,542 words) - 08:05, 9 October 2024
  • Helix, Phelix, Py, TPypy, the HAVAL cryptographic hash function, and the SecurID hash function. Preneel, Bart; Bosselaers, Antoon; Govaerts, RenĂ©; Vandewalle...
    11 KB (940 words) - 16:27, 14 May 2024
  • Thumbnail for Peiter Zatko
    buffer overflow vulnerabilities, Oct 2001 Initial Cryptanalysis of the RSA SecurID Algorithm, Jan 2001 AntiSniff: Identification of remote systems in promiscuous...
    39 KB (3,139 words) - 00:47, 14 October 2024
  • Mobile signature (redirect from Mobile ID)
    registration procedures. This is used for example as a replacement for RSA SecurID dongles with anonymous but specific identity in corporate access applications...
    19 KB (2,307 words) - 14:32, 19 June 2023
  • Thumbnail for Cyber kill chain
    Jackson (January 12, 2013). "How Lockheed Martin's 'Kill Chain' Stopped SecurID Attack". DARKReading. Archived from the original on 2024-01-19. Retrieved...
    14 KB (1,416 words) - 10:01, 7 July 2024
  • has been used in several prominent hacks, including a breach of the RSA SecurID authentication tool and the Nitro attacks on chemical companies, both in...
    3 KB (234 words) - 16:35, 5 July 2024
  • implanted backdoors into them. In 2011 RSA was hacked and secret keys of securID tokens were stolen which allowed hackers to circumvent their authentication...
    10 KB (999 words) - 01:15, 30 July 2024
  • Thumbnail for Keychain
    network connection to a secure network. (A well-known example is the RSA SecurID token.) This kind of key fob may have a keypad on which the user must enter...
    14 KB (1,792 words) - 22:21, 21 September 2024