Jennifer Seberry

Last updated
Jennifer Seberry
Born13 February 1944  OOjs UI icon edit-ltr-progressive.svg
Alma mater La Trobe University
Awards
  • IACR Fellow (2012)  OOjs UI icon edit-ltr-progressive.svg
Academic career
Doctoral advisor Bertram Mond
Doctoral students

Jennifer Roma Seberry (also published as Jennifer Seberry Wallis; born 13 February 1944 in Sydney) is an Australian cryptographer, mathematician, and computer scientist, currently a professor at the University of Wollongong, Australia. She was formerly the head of the Department of Computer Science and director of the Centre for Computer Security Research at the university.

Contents

Education and career

Seberry attended Parramatta High School and got her BSc at University of New South Wales, 1966; MSc at La Trobe University, 1969; PhD at La Trobe University, 1971 (Computational Mathematics); B.Ec. with two years completed at University of Sydney. [1] Her doctoral advisor was Bertram Mond. [2]

Seberry was the first person to teach cryptology at an Australian University (University of Sydney). She was also the first woman Professor of Computer Science in Australia. She was the first woman Reader in Combinatorial Mathematics in Australia.

As of 2020 she had supervised 30 doctorates and had 71 academic descendants. Her notable students have included Peter Eades, Mirka Miller, and Deborah Street. [2] [3]

Service

Seberry was a founding member of the University of Sydney's Research Foundation for Information Technology Information Security Group in 1987. The group grew into the Australian Information Security Association, an Australian representative industry body with over 1000 paid members and branches in most capitals. [4]

Seberry was one of the founders of the Asiacrypt international conference in 1990 (then called Auscrypt).

Research

Seberry has contributed to the knowledge and use of Hadamard matrices and bent functions for network security. [5] She has published numerous papers on mathematics, cryptography, and computer and network security. She led the team that produced the LOKI and LOKI97 block ciphers and the HAVAL cryptographic hash functions. Seberry is also a co-author of the Py (spelled RU) stream cipher, which was a candidate for the eSTREAM stream cipher project.

Related Research Articles

<span class="mw-page-title-main">Cryptanalysis</span> Study of analyzing information systems in order to discover their hidden aspects

Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

In cryptography, RC4 is a stream cipher. While it is remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, rendering it insecure. It is especially vulnerable when the beginning of the output keystream is not discarded, or when nonrandom or related keys are used. Particularly problematic uses of RC4 have led to very insecure protocols such as WEP.

<span class="mw-page-title-main">Ralph Merkle</span> American cryptographer (born 1952)

Ralph C. Merkle is an American computer scientist and mathematician. He is one of the inventors of public-key cryptography, the inventor of cryptographic hashing, and more recently a researcher and speaker on cryonics.

<span class="mw-page-title-main">Ross J. Anderson</span> British computer scientist (1956–2024)

Ross John Anderson was a British researcher, author, and industry consultant in security engineering. He was Professor of Security Engineering at the Department of Computer Science and Technology, University of Cambridge where he was part of the University's security group.

<span class="mw-page-title-main">Ron Rivest</span> American cryptographer

Ronald Linn Rivest is an American cryptographer and computer scientist whose work has spanned the fields of algorithms and combinatorics, cryptography, machine learning, and election integrity. He is an Institute Professor at the Massachusetts Institute of Technology (MIT), and a member of MIT's Department of Electrical Engineering and Computer Science and its Computer Science and Artificial Intelligence Laboratory.

<span class="mw-page-title-main">Daniel J. Bernstein</span> American mathematician, cryptologist and computer scientist (born 1971)

Daniel Julius Bernstein is an American mathematician, cryptologist, and computer scientist. He was a visiting professor at CASA at Ruhr University Bochum until 2024, as well as a research professor of Computer Science at the University of Illinois at Chicago. Before this, he was a visiting professor in the department of mathematics and computer science at the Eindhoven University of Technology.

Articles related to cryptography include:

<span class="mw-page-title-main">David A. Wagner</span> American computer scientist (born 1974)

David A. Wagner is a professor of computer science at the University of California, Berkeley and a well-known researcher in cryptography and computer security. He is a member of the Election Assistance Commission's Technical Guidelines Development Committee, tasked with assisting the EAC in drafting the Voluntary Voting System Guidelines. He was also a member of the ACCURATE project.

<span class="mw-page-title-main">Eli Biham</span> Israeli cryptographer and cryptanalyst (born 1960)

Eli Biham is an Israeli cryptographer and cryptanalyst who is a professor at the Technion - Israel Institute of Technology Computer Science department. From 2008 to 2013, Biham was the dean of the Technion Computer Science department, after serving for two years as chief of CS graduate school. Biham invented (publicly) differential cryptanalysis, for which he received his Ph.D., while working under Adi Shamir. It had been invented before by a team at IBM during their Data Encryption Standard work; the National Security Agency told IBM to keep the discovery secret.

<span class="mw-page-title-main">Cryptographic hash function</span> Hash function that is suitable for use in cryptography

A cryptographic hash function (CHF) is a hash algorithm that has special properties desirable for a cryptographic application:

Bart Preneel is a Belgian cryptographer and cryptanalyst. He is a professor at Katholieke Universiteit Leuven, in the COSIC group.

Reihaneh "Rei" Safavi-Naini is the NSERC/Telus Industrial Research Chair and the Alberta Innovates Strategic Chair in Information Security at the University of Calgary, Canada.

<span class="mw-page-title-main">Willy Susilo</span> Australian computer scientist

Willy Susilo is an Australian cybersecurity scientist and cryptographer. He is a Distinguished Professor at the School of Computing and Information Technology, Faculty of Engineering and Information Sciences University of Wollongong, Australia.

Lawrence Peter "Lawrie" Brown is a cryptographer and computer security researcher, currently a Senior Lecturer with UNSW Canberra at the Australian Defence Force Academy. His notable work includes the design of the block ciphers LOKI and the AES candidate LOKI97. He received his Ph.D. in mathematics from the University of New South Wales in 1991 under the supervision of Jennifer Seberry, with a dissertation on the design of LOKI and the cryptanalysis of the Data Encryption Standard. Subsequently, his research changed focus to the Safe Erlang mobile code system, to aspects of trust issues in eCommerce with some of his Ph.D. students, and with the use of Proxy Certificates for Client Authentication.

Kaisa Nyberg is a Finnish cryptographer and computer security researcher.

<span class="mw-page-title-main">Cryptography</span> Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

The following outline is provided as an overview of and topical guide to cryptography:

<span class="mw-page-title-main">Tal Rabin</span> American cryptographer

Tal Rabin is a computer scientist and Professor of Computer and Information Science at the University of Pennsylvania and a Director at Amazon Web Services (AWS). She was previously the head of research at the Algorand Foundation and the head of the cryptography research group at IBM's Thomas J. Watson Research Center.

Mirka Miller was a Czech-Australian mathematician and computer scientist interested in graph theory and data security. She was a professor of electrical engineering and computer science at the University of Newcastle.

<span class="mw-page-title-main">Anne Canteaut</span> French cryptographic researcher

Anne Canteaut is a French researcher in cryptography, working at the French Institute for Research in Computer Science and Automation (INRIA) in Paris. She studies the design and cryptanalysis of symmetric-key algorithms and S-boxes.

References

  1. Seberry, Jennifer. "Complete Vitae". University of Wollongong. Retrieved 4 February 2013.
  2. 1 2 Jennifer Seberry at the Mathematics Genealogy Project
  3. Flannery, Dane L.; Horadam, Kathryn J. (2010). "Guest editorial for the special issue on design theory". Cryptography and Communications. 2 (2): 127–128. doi: 10.1007/s12095-010-0035-x . hdl: 10379/11505 . S2CID   20183148.
  4. Seberry, Jennifer. "MyStory" (PDF). University of Wollongong. Archived from the original (PDF) on 15 June 2013. Retrieved 4 February 2013.
  5. "Jennifer Seberry's life work". University of Wollongong. Retrieved 22 September 2006.