Matt Blaze

Last updated
Matt Blaze
Matt Blaze DEF CON 20.jpg
Matt Blaze at DEF CON 20 in 2012
CitizenshipAmerican
Alma mater Princeton University
Columbia University
Hunter College [1]
Known for Cryptography
Trust management
Scientific career
Fields Computer security
Distributed systems [1]
Institutions Georgetown University [2]
University of Pennsylvania [1]
Bell Labs [3]
Website MattBlaze.org

Matt Blaze is an American researcher who focuses on the areas of secure systems, cryptography, and trust management. He is currently the McDevitt Chair of Computer Science and Law at Georgetown University, [2] [4] and is on the board of directors of the Tor Project. [5]

Contents

Work

Blaze received his PhD in computer science from Princeton University.

In 1992, while working for AT&T, Blaze implemented a strong cryptographic package known as "CFS", the Cryptographic File System, for Unix, since ported to Linux. [6] CFS uses Network File System as its transport mechanism, allowing users to encrypt selected directory hierarchies, but mount them unencrypted after providing the key. In November, 1993, he presented a paper on this project, "A Cryptographic File System for Unix", at the 1st ACM Conference on Computer and Communications Security. [7] Blaze also published a paper "Key Management in an Encrypting File System", in the Proceedings USENIX Summer 1994 Technical Conference.

In the early 1990s, at the height of the "crypto war", Blaze was a participant in the Cypherpunks mailing list [8] and in 1994, he found a critical weakness in the wiretapping mechanisms of the Clipper chip. [3] His paper, Protocol Failure in the Escrowed Encryption Standard, [9] pointed out that the Clipper's escrow system had a serious vulnerability: a brute-force attack could allow the Clipper chip to be used as an encryption device, while disabling the key escrow capability. [9] [10] [11] Later during this time, he was one of the authors of a seminal paper on calculating secure key lengths. [12]

After leaving Bell, Blaze was an associate professor of computer and information science at the University of Pennsylvania [13] from 2004 to 2018. [2] Blaze has noted a long-term conflict with the university's locksmith over his master key & safecracking publications. [14] He then joined the faculty at Georgetown University, on a joint appointment at Georgetown Law and the department of computer science.

In 2015, Blaze was part of a team of proponents that included Steven M. Bellovin, J. Alex Halderman, Nadia Heninger, and Andrea M. Matwyshyn who successfully proposed a security research exemption to Section 1201 of the Digital Millennium Copyright Act. [15]

In July 2016, the complete board of the Tor Project resigned and announced a new board, including Matt Blaze. [16] [17]

In 2018, crypto Visa card company Monaco paid Blaze an undisclosed amount for the rights to the domain Crypto.com. [18] Blaze had registered the domain in 1993 and sellers have estimated that the value of the domain was US$5–10 million. [19]

Education

Publications

Related Research Articles

Key escrow is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circumstances, an authorized third party may gain access to those keys. These third parties may include businesses, who may want access to employees' secure business-related communications, or governments, who may wish to be able to view the contents of encrypted communications.

A cypherpunk is one who advocates the widespread use of strong cryptography and privacy-enhancing technologies as a means of effecting social and political change. The cypherpunk movement originated in the late 1980s and gained traction with the establishment of the "Cypherpunks" electronic mailing list in 1992, where informal groups of activists, technologists, and cryptographers discussed strategies to enhance individual privacy and resist state or corporate surveillance. Deeply libertarian in philosophy, the movement is rooted in principles of decentralization, individual autonomy, and freedom from centralized authority. Its influence on society extends to the development of technologies that have reshaped global finance, communication, and privacy practices, such as the creation of Bitcoin and other cryptocurrencies, which embody cypherpunk ideals of decentralized and censorship-resistant money. The movement has also contributed to the mainstreaming of encryption in everyday technologies, such as secure messaging apps and privacy-focused web browsers. The cypherpunk ethos has had a lasting impact on debates around digital rights, surveillance, and personal freedoms in the 21st century. The movement has been active since at least 1990 and continues to inspire initiatives aimed at fostering a more private and secure digital world.

Articles related to cryptography include:

<i>Crypto</i> (book) Book by Steven Levy

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age

The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured "voice and data messages" with a built-in backdoor that was intended to "allow Federal, State, and local law enforcement officials the ability to decode intercepted voice and data transmissions." It was intended to be adopted by telecommunications companies for voice transmission. Introduced in 1993, it was entirely defunct by 1996.

<span class="mw-page-title-main">Whitfield Diffie</span> American cryptographer (born 1944)

Bailey Whitfield 'Whit' Diffie ForMemRS is an American cryptographer and mathematician and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle. Diffie and Hellman's 1976 paper New Directions in Cryptography introduced a radically new method of distributing cryptographic keys, that helped solve key distribution—a fundamental problem in cryptography. Their technique became known as Diffie–Hellman key exchange. The article stimulated the almost immediate public development of a new class of encryption algorithms, the asymmetric key algorithms.

In cryptography, Skipjack is a block cipher—an algorithm for encryption—developed by the U.S. National Security Agency (NSA). Initially classified, it was originally intended for use in the controversial Clipper chip. Subsequently, the algorithm was declassified.

<span class="mw-page-title-main">Ian Goldberg</span> Cryptographer (born 1973)

Ian Avrum Goldberg is a cryptographer and cypherpunk. He is best known for breaking Netscape's implementation of SSL, and for his role as chief scientist of Radialpoint, a Canadian software company. Goldberg is currently a professor at the Faculty of Mathematics of the David R. Cheriton School of Computer Science within the University of Waterloo, and the Canada Research Chair in Privacy Enhancing Technologies. He was formerly Tor Project board of directors chairman, and is one of the designers of off the record messaging.

<span class="mw-page-title-main">Dorothy E. Denning</span> American information security researcher

Dorothy Elizabeth Denning is a US-American information security researcher known for lattice-based access control (LBAC), intrusion detection systems (IDS), and other cyber security innovations. She published four books and over 200 articles. Inducted into the National Cyber Security Hall of Fame in 2012, she is now Emeritus Distinguished Professor of Defense Analysis, Naval Postgraduate School.

Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very high level of protection against any eavesdropper, including the government agencies. There is no precise definition of the boundary line between the strong cryptography and (breakable) weak cryptography, as this border constantly shifts due to improvements in hardware and cryptanalysis techniques. These improvements eventually place the capabilities once available only to the NSA within the reach of a skilled individual, so in practice there are only two levels of cryptographic security, "cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files".

<span class="mw-page-title-main">Steven M. Bellovin</span> American computer scientist

Steven M. Bellovin is a researcher on computer networking and security who has been a professor in the computer science department at Columbia University since 2005. Previously, Bellovin was a fellow at AT&T Labs Research in Florham Park, New Jersey.

Cryptography is the practice and study of encrypting information, or in other words, securing information from unauthorized access. There are many different cryptography laws in different nations. Some countries prohibit the export of cryptography software and/or encryption algorithms or cryptoanalysis methods. Some countries require decryption keys to be recoverable in case of a police investigation.

<span class="mw-page-title-main">Dan Boneh</span> Israeli–American professor

Dan Boneh is an Israeli–American professor in applied cryptography and computer security at Stanford University.

<span class="mw-page-title-main">Adam Back</span> British cryptographer and cypherpunk (born 1970)

Adam Back is a British cryptographer and cypherpunk. He is the CEO of Blockstream, which he co-founded in 2014. He invented Hashcash, which is used in the bitcoin mining process.

In cryptography, Curve25519 is an elliptic curve used in elliptic-curve cryptography (ECC) offering 128 bits of security and designed for use with the Elliptic-curve Diffie–Hellman (ECDH) key agreement scheme. It is one of the fastest curves in ECC, and is not covered by any known patents. The reference implementation is public domain software.

<span class="mw-page-title-main">Cryptography</span> Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

<span class="mw-page-title-main">Moti Yung</span> Israeli computer scientist

Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography.

CryptoParty (Crypto-Party) is a grassroots global endeavour to introduce the basics of practical cryptography such as the Tor anonymity network, I2P, Freenet, key signing parties, disk encryption and virtual private networks to the general public. The project primarily consists of a series of free public workshops.

<span class="mw-page-title-main">Bullrun (decryption program)</span> Code name of a decryption program run by the NSA

Bullrun is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA). The British Government Communications Headquarters (GCHQ) has a similar program codenamed Edgehill. According to the Bullrun classification guide published by The Guardian, the program uses multiple methods including computer network exploitation, interdiction, industry relationships, collaboration with other intelligence community entities, and advanced mathematical techniques.

<span class="mw-page-title-main">Nadia Heninger</span> American cryptographer, computer security expert

Nadia Heninger is an American cryptographer, computer security expert, and computational number theorist at the University of California, San Diego.

References

  1. 1 2 3 "Penn Engineering - Research Directory Profile". Princeton University. Retrieved 14 July 2016.
  2. 1 2 3 "One of World's Leading Computer and Network Security Experts Joins Georgetown Faculty". law.georgetown.edu. Retrieved 1 March 2019.
  3. 1 2 Markoff, John (3 June 1994). "At AT&T, No Joy on Clipper Flaw". The New York Times. Retrieved 13 July 2016.
  4. "Matthew Blaze Moves to Georgetown University". Meritalk.com. Retrieved 1 March 2019.
  5. Perlroth, Nicole (13 July 2016). "Tor Project, a Digital Privacy Group, Reboots With New Board". The New York Times. Retrieved 13 July 2016.
  6. "Using CFS, the Cryptographic Filesystem", Oct 15, 2002, Jerry Sweet, Linux Journal
  7. "A Cryptographic File System for Unix", Matt Blaze, att.com
  8. Rodger, Will (30 November 2001). "Cypherpunks RIP". The Register. Retrieved 14 July 2016. Past participants include noted cryptographers such as Matt Blaze ...
  9. 1 2 Blaze, Matt (August 20, 1994). "Protocol Failure in the Escrowed Encryption Standard" (PDF). Proceedings of the 2nd ACM Conference on Computer and Communications Security: 59–67.
  10. Security Flaw Allows Wiretaps to Be Evaded, Study Finds", John Schwartz and John Markoff, New York Times , November 30, 2005
  11. Between a Hacker and a Hard Place", Peter H. Lewis, The New York Times , April 10, 1995
  12. Blaze, Matt; Diffie, Whitefield; Rivest, Ronald L.; Schneier, Bruce; Shimomura, Tsutomu; Thompson, Eric; Wiener, Michael (January 1996). "Minimal key lengths for symmetric ciphers to provide adequate commercial security". Fortify . Retrieved 14 October 2011.
  13. "Penn Engineering Profile". Seas.upenn.edu. Retrieved 1 March 2019.
  14. @mattblaze (30 July 2022). "So we got into this vicious (to him) or virtuous (to me) cycle, where every time I'd do any researching or give any…" (Tweet) via Twitter.
  15. "Section 1201 Rulemaking: Sixth Triennial Proceeding to Determine Exemptions to the Prohibition on Circumvention" (PDF).
  16. "Tor Project installs new board of directors after Jacob Appelbaum controversy", Colin Lecher, July 13, 2016, The Verge
  17. "The Tor Project Elects New Board of Directors" Archived 2017-08-06 at the Wayback Machine , July 13th, 2016, Tor.org
  18. Russell, Jon (8 July 2018). "Crypto Visa card company Monaco just spent millions to buy Crypto.com". TechCrunch.
  19. Robertson, Adi (2018-07-06). "Crypto.com, the multimillion-dollar cryptography domain whose owner refused to sell, has been sold". The Verge . Retrieved November 19, 2021.