56 online
 
Most Popular Choices
Share on Facebook 11 Printer Friendly Page More Sharing
General News   

Vendor Bingo; Voting Machine Roulette & Security of OUR Elections! Dr. Matt Blaze & Rep. Dennis Kucinich on "Voice of th

By       (Page 2 of 3 pages) Become a premium member to see this article and all articles as one long page.   No comments
Message Press Release
****************************************************

Dr. Blaze's Research Summary and Bio:
Secure Systems and Cryptology

My research focuses on the architecture and design of secure systems
based on cryptographic techniques, analysis of secure systems against
practical attack models, and on finding new cryptographic primitives and
techniques. This work has led directly to several new cryptographic
concepts, including: "Remotely-Keyed Encryption," which allows the use of
inexpensive, low-bandwidth secure hardware to protect high-bandwidth
communication and stored data, "Atomic Proxy Cryptography," which allows
re-encryption by untrusted third parties, and "Master-Key Encryption," which
provides a systematic way to design (and study) ciphers with built-in "back
doors."

I am especially interested in the use of encryption to protect
insecure systems such as the Internet. I was a designer of swIPe, a
predecessor of the now standard IPSEC protocol for protecting Internet
traffic. Another project, CFS, investigated and demonstrated the feasibility
of including encryption as file system service.

Recently, I've applied cryptologic techniques to other areas,
including the analysis of physical security systems; this work yielded a
powerful and practical attack against virtually all commonly used
master-keyed mechanical locks.

Trust Management

I coined the term, and am one of the inventors of, Trust Management,
which provides the abstract layer in which a system decides whether to allow
some potentially dangerous action. This work has led to two trust management
languages, KeyNote and PolicyMaker, that provide tools for specifying
policy, delegating authority, and controlling access. In addition to
providing a useful framework for studying and proving security properties of
distributed systems, our tools have been used to build powerful policy
control mechanisms into several important applications, including the
OpenBSD IPSEC implementation.

Technology and Public Policy

Cryptology and computer security have important relationships to vital
areas of public policy, and my work has touched on these in several ways. In
1994, I discovered a serious flaw in the US Government's "Clipper"
encryption system, which had been proposed as a mechanism for the public to
encrypt their data in a way that would still allow access by law
enforcement. I have edited several influential reports on encryption policy,
including the 1998 study of "key escrow" systems that demonstrated that such
systems are inherently less secure and more expensive than systems without
such a feature. This work contributed to the recent shift in U.S. encryption
policy. More recently, I have been active in the analysis of the FBI's
''Carnivore'' Internet wiretap system. I have testified before various
committees of the US Congress and European Parliament several times,
providing technical perspective on the problems surrounding law enforcement
and intelligence access to communications traffic and computer data.

Biographical Information

Education:

* Princeton University, Ph.D., Computer Science, January 1993.
(Thesis: Caching in Large-Scale Distributed File Systems.)<./ul>
* Princeton University, M.A., Computer Science, June 1989.
* Columbia University, M.S., Computer Science, May 1988.
* City University of New York (Hunter College) B.S., January 1986.
Current Appointments

* University of Pennsylvania, Philadelphia, PA. Associate
Professor of Computer and Information Science.
Home page: http://www.crypto.com/

Blog: http://www.crypto.com/blog


**************************************

Congressman Dennis Kucinich's Bio

Next Page  1  |  2  |  3

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

Rate It | View Ratings

Press Release Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines

 
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEd News Newsletter
Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Jill Stein Campaign Goes Viral after Sanders' Clinton endorsement

BPA Levels in Adults up 70 Percent after Drinking from Plastic Bottles

NYPD Commissioner Bratton compares NYC Black Lives Matter protests to Paris and Mumbai terrorist attacks

Moveon Endorses Bernie Sanders; Top Five Reasons Why

Democrats Adopt Most Progressive Platform in Party History

To View Comments or Join the Conversation:

Tell A Friend