The topic of this article may not meet Wikipedia's general notability guideline .(May 2024) |
Nicko van Someren | |
---|---|
Citizenship | British |
Alma mater | Trinity College, Cambridge |
Scientific career | |
Fields | Computer Science |
Doctoral advisor | Neil Wiseman |
Nicholas van Someren (born 1967) is a British computer scientist, cryptographer and entrepreneur. He is known for having founded ANT Software, and nCipher, as well as for previous roles as chief security architect at Juniper Networks and chief technology officer at Good Technology and the Linux Foundation, where he ran the Core Infrastructure Initiative. [1] [ citation needed ] He is currently the chief technology officer at Absolute Software Corporation.
Van Someren attended King College Choir School in Cambridge, UK before receiving a scholarship to Oakham School in Rutland. He went on to study as an undergraduate in Computer Science at Trinity College, Cambridge, where he subsequently earned a PhD. [2]
Van Someren credits his interest in business to his father, who ran a business from their home when he was young. [3] While still at school van Someren took summer jobs with Acorn Computers and acquired an interest in cryptography by reading about public key encryption in Scientific American. [4]
In 1992 Nicko van Someren and his brother Alex van Someren, along with two friends, founded ANT Software [5] to build networking hardware. While with ANT, van Someren wrote the first version of the Fresco web browser which helped the company move from being primarily a hardware company to a software company. ANT went public on the London Alternative Investments Market in March 2005. [6] In February 2013 ANT was acquired by Espial Group. [7]
In 1996 van Someren, along with his brother Alex co-founded nCipher [8] to build high speed cryptographic accelerators and hardware security modules. nCipher went public on the London Stock Exchange in October 2000, at the time valuing the company at around £450 million. [9] In October 2008 nCipher was acquired by Thales Group. [10]
Van Someren was chief security architect at Juniper Networks, [11] [ citation needed ] then joined Good Technology as CTO in 2011, [12] and remained with Good until its acquisition by BlackBerry Limited in 2015. He was then appointed to be CTO of the Linux Foundation. [11]
In 2019, van Someren joined Absolute Software Corporation as CTO. [13]
In 2008 van Someren was elected as a Fellow of the Royal Academy of Engineering [14] in the UK.
Van Someren has published numerous papers in the field of computer security. In 1998 he co-authored a paper [15] with Adi Shamir introducing the concept of key finding attacks. A statistical key finding attack was used by van Someren to locate the signature verification keys used by Microsoft to validate the signatures on MS-CAPI plug-ins. One of these key was later discovered to be referred to as the NSAKEY by Microsoft, sparking some controversy. [16]
The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
In cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called blocks. Block ciphers are the elementary building blocks of many cryptographic protocols. They are ubiquitous in the storage and exchange of data, where such data is secured and authenticated via encryption.
The Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryptography.
In cryptography, RC4 is a stream cipher. While it is remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, rendering it insecure. It is especially vulnerable when the beginning of the output keystream is not discarded, or when nonrandom or related keys are used. Particularly problematic uses of RC4 have led to very insecure protocols such as WEP.
Daniel Julius Bernstein is an American mathematician, cryptologist, and computer scientist. He is a visiting professor at CASA at Ruhr University Bochum, as well as a research professor of Computer Science at the University of Illinois at Chicago. Before this, he was a visiting professor in the department of mathematics and computer science at the Eindhoven University of Technology.
In cryptography, Skipjack is a block cipher—an algorithm for encryption—developed by the U.S. National Security Agency (NSA). Initially classified, it was originally intended for use in the controversial Clipper chip. Subsequently, the algorithm was declassified.
The security of cryptographic systems depends on some secret data that is known to authorized persons but unknown and unpredictable to others. To achieve this unpredictability, some randomization is typically employed. Modern cryptographic protocols often require frequent generation of random quantities. Cryptographic attacks that subvert or exploit weaknesses in this process are known as random number generator attacks.
Encryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over the Internet.
Mwende Window Snyder, better known as Window Snyder, is an American computer security expert. She has been a top security officer at Square, Inc., Apple, Fastly, Intel and Mozilla Corporation. She was also a senior security strategist at Microsoft. She is co-author of Threat Modeling, a standard manual on application security.
In cryptography, a T-function is a bijective mapping that updates every bit of the state in a way that can be described as , or in simple words an update function in which each bit of the state is updated by a linear combination of the same bit and a function of a subset of its less significant bits. If every single less significant bit is included in the update of every bit in the state, such a T-function is called triangular. Thanks to their bijectivity regardless of the used Boolean functions and regardless of the selection of inputs, T-functions are now widely used in cryptography to construct block ciphers, stream ciphers, PRNGs and hash functions. T-functions were first proposed in 2002 by A. Klimov and A. Shamir in their paper "A New Class of Invertible Mappings". Ciphers such as TSC-1, TSC-3, TSC-4, ABC, Mir-1 and VEST are built with different types of T-functions.
Burton S. "Burt" Kaliski, Jr. is a cryptographer, who is currently the chief technology officer (CTO) and senior vice president at Verisign. Before joining Verisign in 2011, he was the founding director of the EMC Innovation Network at EMC Corporation since its 2006 acquisition of RSA Security where he was Chief Scientist for RSA Laboratories. His notable work includes the development of such public key cryptography standards as PKCS and IEEE P1363, the extension of linear cryptanalysis to use multiple approximations, and the design of the block cipher Crab.
The various versions of Microsoft's desktop operating system, Windows, have received various criticisms since Microsoft's inception.
Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly known, and not all entries may be up to date.
PRESENT is a lightweight block cipher, developed by the Orange Labs (France), Ruhr University Bochum (Germany) and the Technical University of Denmark in 2007. PRESENT was designed by Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, and C. Vikkelsoe. The algorithm is notable for its compact size.
Key Finding Attacks are attacks on computer systems that make use of cryptography in which computer memory or non-volatile storage is searched for private cryptographic keys that can be used to decrypt or sign data. The term is generally used in the context of attacks which search memory much more efficiently than simply testing each sequence of bytes to determine if it provides the correct answer. They are often used in combination with cold boot attacks to extract key material from computers.
Hardware-based encryption is the use of computer hardware to assist software, or sometimes replace software, in the process of data encryption. Typically, this is implemented as part of the processor's instruction set. For example, the AES encryption algorithm can be implemented using the AES instruction set on the ubiquitous x86 architecture. Such instructions also exist on the ARM architecture. However, more unusual systems exist where the cryptography module is separate from the central processor, instead being implemented as a coprocessor, in particular a secure cryptoprocessor or cryptographic accelerator, of which an example is the IBM 4758, or its successor, the IBM 4764. Hardware implementations can be faster and less prone to exploitation than traditional software implementations, and furthermore can be protected against tampering.
This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.
Alexander Rupert van Someren FREng is a British computing entrepreneur and venture capitalist, best known for founding the hardware encryption company nCipher in 1996 with his brother Nicko van Someren. In July 2021 he was appointed Chief Scientific Adviser for National Security, succeeding Anthony Finkelstein.
{{cite web}}
: CS1 maint: bot: original URL status unknown (link)