Nicko van Someren

Last updated

Nicko van Someren
Kiwicon 6 - Nicko van Someren (cropped).jpg
Nicko van Someren at Kiwicon in Wellington, New Zealand (2012)
CitizenshipBritish
Alma mater Trinity College, Cambridge
Scientific career
Fields Computer Science
Doctoral advisor Neil Wiseman

Nicholas van Someren (born 1967) is a British computer scientist, cryptographer and entrepreneur. He is known for having founded ANT Software, and nCipher, as well as for previous roles as chief security architect at Juniper Networks and chief technology officer at Good Technology and the Linux Foundation, where he ran the Core Infrastructure Initiative. [1] [ citation needed ] He is currently the chief technology officer at Absolute Software Corporation.

Contents

Education and early life

Van Someren attended King College Choir School in Cambridge, UK before receiving a scholarship to Oakham School in Rutland. He went on to study as an undergraduate in Computer Science at Trinity College, Cambridge, where he subsequently earned a PhD. [2]

Van Someren credits his interest in business to his father, who ran a business from their home when he was young. [3] While still at school van Someren took summer jobs with Acorn Computers and acquired an interest in cryptography by reading about public key encryption in Scientific American. [4]

Businesses

In 1992 Nicko van Someren and his brother Alex van Someren, along with two friends, founded ANT Software [5] to build networking hardware. While with ANT, van Someren wrote the first version of the Fresco web browser which helped the company move from being primarily a hardware company to a software company. ANT went public on the London Alternative Investments Market in March 2005. [6] In February 2013 ANT was acquired by Espial Group. [7]

In 1996 van Someren, along with his brother Alex co-founded nCipher [8] to build high speed cryptographic accelerators and hardware security modules. nCipher went public on the London Stock Exchange on October 2000, at the time valuing the company at around £450 million. [9] In October 2008 nCipher was acquired by Thales Group. [10]

Van Someren was chief security architect at Juniper Networks, [11] [ citation needed ] then joined Good Technology as CTO in 2011, [12] and remained with Good until its acquisition by BlackBerry Limited in 2015. He was then appointed to be CTO of the Linux Foundation. [11]

In 2019, van Someren joined Absolute Software Corporation as CTO. [13]

Accomplishments

In 2008 van Someren was elected as a Fellow of the Royal Academy of Engineering [14] in the UK.

Work in computer security

Van Someren has published numerous papers in the field of computer security. In 1998 he co-authored a paper [15] with Adi Shamir introducing the concept of key finding attacks. A statistical key finding attack was used by van Someren to locate the signature verification keys used by Microsoft to validate the signatures on MS-CAPI plug-ins. One of these key was later discovered to be referred to as the NSAKEY by Microsoft, sparking some controversy. [16]

Related Research Articles

<span class="mw-page-title-main">Advanced Encryption Standard</span> Standard for the encryption of electronic data

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

<span class="mw-page-title-main">Data Encryption Standard</span> Early unclassified symmetric-key block cipher

The Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryptography.

In cryptography, RC4 is a stream cipher. While it is remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, rendering it insecure. It is especially vulnerable when the beginning of the output keystream is not discarded, or when nonrandom or related keys are used. Particularly problematic uses of RC4 have led to very insecure protocols such as WEP.

Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning that is distinct from the field of confidential computing. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by computer hardware and software. Enforcing this behavior is achieved by loading the hardware with a unique encryption key that is inaccessible to the rest of the system and the owner.

<span class="mw-page-title-main">Daniel J. Bernstein</span> American mathematician, cryptologist and computer scientist (born 1971)

Daniel Julius Bernstein is an American mathematician, cryptologist, and computer scientist. He is a visiting professor at CASA at Ruhr University Bochum, as well as a research professor of Computer Science at the University of Illinois at Chicago. Before this, he was a visiting professor in the department of mathematics and computer science at the Eindhoven University of Technology.

In cryptography, Skipjack is a block cipher—an algorithm for encryption—developed by the U.S. National Security Agency (NSA). Initially classified, it was originally intended for use in the controversial Clipper chip. Subsequently, the algorithm was declassified.

Encryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over the Internet.

<span class="mw-page-title-main">Window Snyder</span> Computer security expert (born 1975)

Mwende Window Snyder, better known as Window Snyder, is an American computer security expert. She has been a top security officer at Square, Inc., Apple, Fastly, Intel and Mozilla Corporation. She was also a senior security strategist at Microsoft. She is co-author of Threat Modeling, a standard manual on application security.

In cryptography, a T-function is a bijective mapping that updates every bit of the state in a way that can be described as , or in simple words an update function in which each bit of the state is updated by a linear combination of the same bit and a function of a subset of its less significant bits. If every single less significant bit is included in the update of every bit in the state, such a T-function is called triangular. Thanks to their bijectivity regardless of the used Boolean functions and regardless of the selection of inputs, T-functions are now widely used in cryptography to construct block ciphers, stream ciphers, PRNGs and hash functions. T-functions were first proposed in 2002 by A. Klimov and A. Shamir in their paper "A New Class of Invertible Mappings". Ciphers such as TSC-1, TSC-3, TSC-4, ABC, Mir-1 and VEST are built with different types of T-functions.

The various versions of Microsoft's desktop operating system, Windows, have received various criticisms since Microsoft's inception.

<span class="mw-page-title-main">Cryptography</span> Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly known, and not all entries may be up to date.

PRESENT is a lightweight block cipher, developed by the Orange Labs (France), Ruhr University Bochum (Germany) and the Technical University of Denmark in 2007. PRESENT was designed by Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, and C. Vikkelsoe. The algorithm is notable for its compact size.

Logjam is a security vulnerability in systems that use Diffie–Hellman key exchange with the same prime number. It was discovered by a team of computer scientists and publicly reported on May 20, 2015. The discoverers were able to demonstrate their attack on 512-bit DH systems. They estimated that a state-level attacker could do so for 1024-bit systems, then widely used, thereby allowing decryption of a significant fraction of Internet traffic. They recommended upgrading to at least 2048 bits for shared prime systems.

Key Finding Attacks are attacks on computer systems that make use of cryptography in which computer memory or non-volatile storage is searched for private cryptographic keys that can be used to decrypt or sign data. The term is generally used in the context of attacks which search memory much more efficiently than simply testing each sequence of bytes to determine if it provides the correct answer. They are often used in combination with cold boot attacks to extract key material from computers.

<span class="mw-page-title-main">Hardware-based encryption</span> Use of computer hardware to assist software in the process of data encryption

Hardware-based encryption is the use of computer hardware to assist software, or sometimes replace software, in the process of data encryption. Typically, this is implemented as part of the processor's instruction set. For example, the AES encryption algorithm can be implemented using the AES instruction set on the ubiquitous x86 architecture. Such instructions also exist on the ARM architecture. However, more unusual systems exist where the cryptography module is separate from the central processor, instead being implemented as a coprocessor, in particular a secure cryptoprocessor or cryptographic accelerator, of which an example is the IBM 4758, or its successor, the IBM 4764. Hardware implementations can be faster and less prone to exploitation than traditional software implementations, and furthermore can be protected against tampering.

This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.

<span class="mw-page-title-main">Orr Dunkelman</span> Israeli cryptographer and cryptanalyst

Orr Dunkelman is an Israeli cryptographer and cryptanalyst, currently a professor at the University of Haifa Computer Science department. Dunkelman is a co-director of the Center for Cyber Law & Privacy at the University of Haifa and a co-founder of Privacy Israel, an Israeli NGO for promoting privacy in Israel.

Alexander Rupert van Someren FREng is a British computing entrepreneur and venture capitalist, best known for founding the hardware encryption company nCipher in 1996 with his brother Nicko van Someren. In July 2021 he was appointed Chief Scientific Adviser for National Security, succeeding Anthony Finkelstein.

References

  1. "The Linux Foundation Appoints New Chief Technology Officer, Open Source Community Veterans to Executive Team".
  2. "PhD graduates of the Rainbow Group".
  3. "Interview: Alex and Nicko van Someren".
  4. "Me and My Partner: Alex Van Someren And Nicko Van Someren" . Archived from the original on 20 June 2022.
  5. "Cambridge Ring Hall of Fame: Companies started by Computer Lab graduates and staff". 23 January 2018.
  6. "ANT goes public in UK on back of surge in IPTV deployments".
  7. "Espial Completes Acquisition ANT plc".
  8. Greteman, Blaine (28 July 2003). "Time Global Business August 2003 / Tech Survivors: nCipher, Nicko and Alex van Someren". Time.
  9. "nCipher braces itself for choppy waters after IPO".
  10. "Thales completes nCipher acquisition".
  11. 1 2 The Linux Foundation Appoints New Chief Technology Officer, Open Source Community Veterans to Executive Team, Linux Foundation, February 11, 2016
  12. "Good Technology Hires Security Expert, Nicko van Someren, as New CTO".
  13. "Absolute Appoints Distinguished Security Expert and Technologist Dr. Nicko van Someren as Chief Technology Officer".
  14. "List of Fellows – Royal Academy of Engineering".
  15. Shamir, Adi; van Someren, Nicko (1 January 1998). Playing Hide and Seek With Stored Keys. Lecture Notes in Computer Science. pp. 118–124. CiteSeerX   10.1.1.40.4467 .
  16. "Microsoft/NSA Info". 17 June 2000. Archived from the original on 17 June 2000. Retrieved 12 October 2016.{{cite web}}: CS1 maint: bot: original URL status unknown (link)