Matt Blaze

Last updated
Matt Blaze
Matt Blaze DEF CON 20.jpg
Matt Blaze at DEF CON 20 in 2012
CitizenshipAmerican
Alma mater Princeton University
Columbia University
Hunter College [1]
Known for Cryptography
Trust management
Scientific career
Fields Computer security
Distributed systems [1]
Institutions Georgetown University [2]
University of Pennsylvania [1]
Bell Labs [3]
Website MattBlaze.org

Matt Blaze is an American researcher who focuses on the areas of secure systems, cryptography, and trust management. He is currently the McDevitt Chair of Computer Science and Law at Georgetown University, [2] [4] and is on the board of directors of the Tor Project. [5]

Contents

Work

Blaze received his PhD in computer science from Princeton University.

In 1992, while working for AT&T, Blaze implemented a strong cryptographic package known as "CFS", the Cryptographic File System, for Unix, since ported to Linux. [6] CFS uses Network File System as its transport mechanism, allowing users to encrypt selected directory hierarchies, but mount them unencrypted after providing the key. In November, 1993, he presented a paper on this project, "A Cryptographic File System for Unix", at the 1st ACM Conference on Computer and Communications Security. [7] Blaze also published a paper "Key Management in an Encrypting File System", in the Proceedings USENIX Summer 1994 Technical Conference.

In the early 1990s, at the height of the "crypto war", Blaze was a participant in the Cypherpunks mailing list [8] and in 1994, he found a critical weakness in the wiretapping mechanisms of the Clipper chip. [3] His paper, Protocol Failure in the Escrowed Encryption Standard, [9] pointed out that the Clipper's escrow system had a serious vulnerability: a brute-force attack could allow the Clipper chip to be used as an encryption device, while disabling the key escrow capability. [9] [10] [11] Later during this time, he was one of the authors of a seminal paper on calculating secure key lengths. [12]

After leaving Bell, Blaze was an associate professor of computer and information science at the University of Pennsylvania [13] from 2004 to 2018. [2] Blaze has noted a long-term conflict with the university's locksmith over his master key & safecracking publications. [14] He then joined the faculty at Georgetown University, on a joint appointment at Georgetown Law and the department of computer science.

In 2015, Blaze was part of a team of proponents that included Steven M. Bellovin, J. Alex Halderman, Nadia Heninger, and Andrea M. Matwyshyn who successfully proposed a security research exemption to Section 1201 of the Digital Millennium Copyright Act. [15]

In July 2016, the complete board of the Tor Project resigned and announced a new board, including Matt Blaze. [16] [17]

In 2018, crypto Visa card company Monaco paid Blaze an undisclosed amount for the rights to the domain Crypto.com. [18] Blaze had registered the domain in 1993 and sellers have estimated that the value of the domain was US$5–10 million. [19]

Education

Publications

See also

Related Research Articles

<span class="mw-page-title-main">Encryption</span> Process of converting plaintext to ciphertext

In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.

Key escrow is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third parties may include businesses, who may want access to employees' secure business-related communications, or governments, who may wish to be able to view the contents of encrypted communications.

A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since at least the late 1980s.

Articles related to cryptography include:

<i>Crypto</i> (book) Book by Steven Levy

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age is a book about cryptography written by Steven Levy, published in 2001. Levy details the emergence of public key cryptography, digital signatures and the struggle between the National Security Agency (NSA) and the "cypherpunks". The book details the creation of Data Encryption Standard (DES), RSA and the Clipper chip.

<span class="mw-page-title-main">Clipper chip</span> Encryption device promoted by the NSA in the 1990s

The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured "voice and data messages" with a built-in backdoor that was intended to "allow Federal, State, and local law enforcement officials the ability to decode intercepted voice and data transmissions." It was intended to be adopted by telecommunications companies for voice transmission. Introduced in 1993, it was entirely defunct by 1996.

<span class="mw-page-title-main">Whitfield Diffie</span> American cryptographer (born 1944)

Bailey Whitfield 'Whit' Diffie, ForMemRS, is an American cryptographer and mathematician and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle. Diffie and Hellman's 1976 paper New Directions in Cryptography introduced a radically new method of distributing cryptographic keys, that helped solve key distribution—a fundamental problem in cryptography. Their technique became known as Diffie–Hellman key exchange. The article stimulated the almost immediate public development of a new class of encryption algorithms, the asymmetric key algorithms.

In cryptography, Skipjack is a block cipher—an algorithm for encryption—developed by the U.S. National Security Agency (NSA). Initially classified, it was originally intended for use in the controversial Clipper chip. Subsequently, the algorithm was declassified.

<span class="mw-page-title-main">Ian Goldberg</span> Cryptographer

Ian Avrum Goldberg is a cryptographer and cypherpunk. He is best known for breaking Netscape's implementation of SSL, and for his role as chief scientist of Radialpoint, a Canadian software company. Goldberg is currently a professor at the Faculty of Mathematics of the David R. Cheriton School of Computer Science within the University of Waterloo, and the Canada Research Chair in Privacy Enhancing Technologies. He was formerly Tor Project board of directors chairman, and is one of the designers of off the record messaging.

<span class="mw-page-title-main">Dorothy E. Denning</span> American information security researcher

Dorothy Elizabeth Denning is a US-American information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published four books and over 200 articles. Inducted into the National Cyber Security Hall of Fame in 2012, she is now Emeritus Distinguished Professor of Defense Analysis, Naval Postgraduate School.

In cryptography, the interlock protocol, as described by Ron Rivest and Adi Shamir, is a protocol designed to frustrate eavesdropper attack against two parties that use an anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an authentication protocol, which was subsequently broken.

<span class="mw-page-title-main">Steven M. Bellovin</span>

Steven M. Bellovin is a researcher on computer networking and security. He has been a professor in the Computer Science department at Columbia University since 2005. Previously, Bellovin was a Fellow at AT&T Labs Research in Florham Park, New Jersey.

Cryptography is the practice and study of encrypting information, or in other words, securing information from unauthorized access. There are many different cryptography laws in different nations. Some countries prohibit export of cryptography software and/or encryption algorithms or cryptoanalysis methods. Some countries require decryption keys to be recoverable in case of a police investigation.

<span class="mw-page-title-main">Dan Boneh</span> Israeli-American professor

Dan Boneh is an Israeli-American professor in applied cryptography and computer security at Stanford University.

<span class="mw-page-title-main">Adam Back</span> British cryptographer and cypherpunk (born 1970)

Adam Back is a British cryptographer and cypherpunk. He is the CEO of Blockstream, which he co-founded in 2014. He invented Hashcash, which is used in the Bitcoin mining process.

<span class="mw-page-title-main">Cryptography</span> Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

<span class="mw-page-title-main">Moti Yung</span>

Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography.

<span class="mw-page-title-main">Vincent Moscaritolo</span> American computer security expert

Vincent (Vinnie) Moscaritolo is a retired American computer security expert known for his work in encryption applications for mobile devices. After decades in the computer industry, he now volunteers as a search and rescue professional. He holds NREMT, WFR, and Amateur Radio Extra Class and a General Radiotelephone Operator with Ships Radar License.

<span class="mw-page-title-main">Bullrun (decryption program)</span> Code name of a decryption program run by the NSA

Bullrun is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA). The British Government Communications Headquarters (GCHQ) has a similar program codenamed Edgehill. According to the Bullrun classification guide published by The Guardian, the program uses multiple methods including computer network exploitation, interdiction, industry relationships, collaboration with other intelligence community entities, and advanced mathematical techniques.

<span class="mw-page-title-main">Nadia Heninger</span> American cryptographer, computer security expert

Nadia Heninger is an American cryptographer, computer security expert, and computational number theorist at the University of California, San Diego.

References

  1. 1 2 3 "Penn Engineering - Research Directory Profile". Princeton University. Retrieved 14 July 2016.
  2. 1 2 3 "One of World's Leading Computer and Network Security Experts Joins Georgetown Faculty". law.georgetown.edu. Retrieved 1 March 2019.
  3. 1 2 Markoff, John (3 June 1994). "At AT&T, No Joy on Clipper Flaw". The New York Times. Retrieved 13 July 2016.
  4. "Matthew Blaze Moves to Georgetown University". Meritalk.com. Retrieved 1 March 2019.
  5. Perlroth, Nicole (13 July 2016). "Tor Project, a Digital Privacy Group, Reboots With New Board". The New York Times. Retrieved 13 July 2016.
  6. "Using CFS, the Cryptographic Filesystem", Oct 15, 2002, Jerry Sweet, Linux Journal
  7. "A Cryptographic File System for Unix", Matt Blaze, att.com
  8. Rodger, Will (30 November 2001). "Cypherpunks RIP". The Register. Retrieved 14 July 2016. Past participants include noted cryptographers such as Matt Blaze ...
  9. 1 2 Blaze, Matt (August 20, 1994). "Protocol Failure in the Escrowed Encryption Standard" (PDF). Proceedings of the 2nd ACM Conference on Computer and Communications Security: 59–67.
  10. Security Flaw Allows Wiretaps to Be Evaded, Study Finds", John Schwartz and John Markoff, New York Times , November 30, 2005
  11. Between a Hacker and a Hard Place", Peter H. Lewis, The New York Times , April 10, 1995
  12. Blaze, Matt; Diffie, Whitefield; Rivest, Ronald L.; Schneier, Bruce; Shimomura, Tsutomu; Thompson, Eric; Wiener, Michael (January 1996). "Minimal key lengths for symmetric ciphers to provide adequate commercial security". Fortify . Retrieved 14 October 2011.
  13. "Penn Engineering Profile". Seas.upenn.edu. Retrieved 1 March 2019.
  14. @mattblaze (30 July 2022). "So we got into this vicious (to him) or virtuous (to me) cycle, where every time I'd do any researching or give any…" (Tweet) via Twitter.
  15. "Section 1201 Rulemaking: Sixth Triennial Proceeding to Determine Exemptions to the Prohibition on Circumvention" (PDF).{{cite web}}: CS1 maint: url-status (link)
  16. "Tor Project installs new board of directors after Jacob Appelbaum controversy", Colin Lecher, July 13, 2016, The Verge
  17. "The Tor Project Elects New Board of Directors" Archived 2017-08-06 at the Wayback Machine , July 13th, 2016, Tor.org
  18. Russell, Jon (8 July 2018). "Crypto Visa card company Monaco just spent millions to buy Crypto.com". TechCrunch.
  19. Robertson, Adi (2018-07-06). "Crypto.com, the multimillion-dollar cryptography domain whose owner refused to sell, has been sold". The Verge . Retrieved November 19, 2021.{{cite web}}: CS1 maint: url-status (link)