Nikita Borisov

Last updated
Nikita Borisov
Born24 December 1977
Occupation(s) Professor, UIUC
Known for OTR
Website http://hatswitch.org/~nikita/

Nikita Borisov is a cryptographer and computer security researcher, currently an associate professor at the University of Illinois at Urbana-Champaign (UIUC). His notable work includes one of the first cryptanalyses of the WEP wireless encryption protocol together with Ian Goldberg and David Wagner, and the design of the Off-the-Record Messaging protocol with Goldberg. [1]

Borisov received a B. Math in computer science and pure math in 1997 from the University of Waterloo. He received an M.S. and a Ph.D. in computer science from the University of California, Berkeley in 2002 and 2005, respectively.

Related Research Articles

In cryptography, an initialization vector (IV) or starting variable is an input to a cryptographic primitive being used to provide the initial state. The IV is typically required to be random or pseudorandom, but sometimes an IV only needs to be unpredictable or unique. Randomization is crucial for some encryption schemes to achieve semantic security, a property whereby repeated usage of the scheme under the same key does not allow an attacker to infer relationships between segments of the encrypted message. For block ciphers, the use of an IV is described by the modes of operation.

<span class="mw-page-title-main">David A. Wagner</span> American computer scientist

David A. Wagner is a professor of computer science at the University of California, Berkeley and a well-known researcher in cryptography and computer security. He is a member of the Election Assistance Commission's Technical Guidelines Development Committee, tasked with assisting the EAC in drafting the Voluntary Voting System Guidelines. He is also a member of the ACCURATE project.

<span class="mw-page-title-main">University of Illinois Urbana-Champaign</span> Public university in Illinois, US

The University of Illinois Urbana-Champaign is a public land-grant research university in Champaign, Illinois, and Urbana, Illinois. It is the flagship institution of the University of Illinois system and was founded in 1867. With over 53,000 students, the University of Illinois is one of the largest public universities by enrollment in the United States.

<span class="mw-page-title-main">Ian Goldberg</span> Cryptographer

Ian Avrum Goldberg is a cryptographer and cypherpunk. He is best known for breaking Netscape's implementation of SSL, and for his role as chief scientist of Radialpoint, a Canadian software company. Goldberg is currently a professor at the Faculty of Mathematics of the David R. Cheriton School of Computer Science within the University of Waterloo, and the Canada Research Chair in Privacy Enhancing Technologies. He was formerly Tor Project board of directors chairman, and is one of the designers of off the record messaging.

The Centre for Applied Cryptographic Research (CACR) is a group of industrial representatives, professors, and students at the University of Waterloo in Waterloo, Ontario, Canada who work and do research in the field of cryptography.

Donna J. Cox is an American artist and scientist, Michael Aiken Endowed Chair; Professor of Art + Design; Director, Advanced Visualization Lab at the University of Illinois at Urbana-Champaign (UIUC); Director, Visualization and Experimental Technologies at National Center for Supercomputing Applications (NCSA); and Director, edream. She is a recognized pioneer in computer art and scientific visualization, specifically cinematic scientific visualization.

<span class="mw-page-title-main">Donald B. Gillies</span> Canadian computer scientist and mathematician

Donald Bruce Gillies was a Canadian computer scientist and mathematician who worked in the fields of computer design, game theory, and minicomputer programming environments.

Off-the-Record Messaging (OTR) is a cryptographic protocol that provides encryption for instant messaging conversations. OTR uses a combination of AES symmetric-key algorithm with 128 bits key length, the Diffie–Hellman key exchange with 1536 bits group size, and the SHA-1 hash function. In addition to authentication and encryption, OTR provides forward secrecy and malleable encryption.

In cryptography, forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of specific key-agreement protocols that gives assurances that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised, limiting damage. For HTTPS, the long-term secret is typically the private key of the server. Forward secrecy protects past sessions against future compromises of keys or passwords. By generating a unique session key for every session a user initiates, the compromise of a single session key will not affect any data other than that exchanged in the specific session protected by that particular key. This by itself is not sufficient for forward secrecy which additionally requires that a long-term secret compromise does not affect the security of past session keys.

In computer science, the Actor model and process calculi are two closely related approaches to the modelling of concurrent digital computation. See Actor model and process calculi history.

A LAN Messenger is an instant messaging program for computers designed for use within a single local area network (LAN).

Kalyanmoy Deb is an Indian computer scientist. Deb is the Herman E. & Ruth J. Koenig Endowed Chair Professor in the Department of Electrical and Computing Engineering at Michigan State University. Deb is also a professor in the Department of Computer Science and Engineering and the Department of Mechanical Engineering at Michigan State University.

In cryptography, deniable authentication refers to message authentication between a set of participants where the participants themselves can be confident in the authenticity of the messages, but it cannot be proved to a third party after the event.

Mustafa Tamer Başar is a control and game theorist who is the Swanlund Endowed Chair and Center for Advanced Study Professor of Electrical and Computer Engineering at the University of Illinois at Urbana-Champaign, USA. He is also the Director of the Center for Advanced Study.

Michael Stewart Paterson, is a British computer scientist, who was the director of the Centre for Discrete Mathematics and its Applications (DIMAP) at the University of Warwick until 2007, and chair of the department of computer science in 2005.

Sarita Vikram Adve is the Richard T. Cheng Professor of Computer Science at the University of Illinois at Urbana-Champaign. Her research interests are in computer architecture and systems, parallel computing, and power and reliability-aware systems.

<span class="mw-page-title-main">Danny Cohen (computer scientist)</span> American computer scientist

Danny Cohen was an Israeli American computer scientist specializing in computer networking. He was involved in the ARPAnet project and helped develop various fundamental applications for the Internet. He was one of the key figures behind the separation of TCP and IP ; this allowed the later creation of UDP.

Ran Canetti is a professor of Computer Science at Boston University. and the director of the Check Point Institute for Information Security and of the Center for Reliable Information System and Cyber Security. He is also associate editor of the Journal of Cryptology and Information and Computation. His main areas of research span cryptography and information security, with an emphasis on the design, analysis and use of cryptographic protocols.

Roy H. Campbell is a computer scientist and the Sohaib and Sara Abbasi Professor emeritus at University of Illinois at Urbana–Champaign and director of the Assured Cloud Computing University Center of Excellence. Campbell is best known for his work in operating systems, parallel computing, and multimedia on the internet.

Refraction networking, also known as decoy routing, is a research anti-censorship approach that would allow users to circumvent a censor without using any individual proxy servers. Instead, it implements proxy functionality at the core of partner networks, such as those of Internet service providers, outside the censored country. These networks would discreetly provide censorship circumvention for "any connection that passes through their networks." This prevents censors from selectively blocking proxy servers and makes censorship more expensive, in a strategy similar to collateral freedom.

References

  1. Barger, Jorn (February 14, 2005). "Paradigms for Paranoids: Off-the-record messaging". The Register . Retrieved April 23, 2009.