Crypto Gurus Diffie, Hellman Win 2015 Turing Award (networkworld.com) 55
alphadogg writes: Whitfield Diffie and Martin Hellman, whose names have been linked since their seminal paper introduced the concepts of public key encryption and digital signatures some 40 years ago, have been named winners of the $1M A.M. Turing Award for 2015 (a.k.a., the 'Nobel Prize of Computing'). The work of Diffie, formerly chief security officer of Sun Microsystems, and Hellman, professor emeritus of electrical engineering at Stanford University, has had a huge impact on the secure exchange of information across the Internet, the cloud and email.
Re: (Score:2, Informative)
Phone assistance started with Nixon, expanded by Reagan and again expanded by Obama. Both expansion where to keep up with the times and needs of the nation.
No one called them Nixonphones or Reaganphones.
It is simply a long-standing federal program.
Re: (Score:2)
This is the person which was being spoken of:
https://www.youtube.com/watch?... [youtube.com]
She is the person low on facts and voting for Obama because he gave her a free cell phone. The poster was just bringing up the low information nature of the general public, it is a constant issue during elections, many people just vote by name recognition without knowing anything about the person.
Re: (Score:1)
Absent the teagaggers he wouldn't break 3%
Re: (Score:2)
Well deserved (Score:1)
Congrats!! Well deserved. And thanks for all the fish.
What about Merkle? (Score:3)
Re: (Score:2)
Which is why I'm a small-government libertarian as opposed to those promoting an all-knowing, all-powerful bureaucracy. You know who your are.
Re: (Score:2)
All your Internets belong to us
When encryption is outlawed... (Score:2, Troll)
So when will the FBI arrest them? After all, if you have nothing to hide from the government, then you don't need encryption. Wanting encryption proves you MUST be a criminal. Creating encryption makes you the accomplice.
Even worse, if you want encryption you must be a future criminal planning how to hide the evidence!
Actually, you better wave bye-bye to what little privacy is left. Even the multi-millionaires and billionaires can't buy privacy now. Ask Mitt Romney, eh?
(Maybe I spoke too soon? I really wish
A very well deserved award (Score:5, Informative)
Probably the greatest claim to fame for Diffie and Hellman would be the paper "New Directions in Cryptography" which described Diffie-Hellman key exchange and is one of the first public descriptions of strong (or strong for its day) cryptography. (back then most cryptography was controlled by governments, militaries and intelligence agencies).
I cant find a cite but I could swear the government tried to censor Diffie and Hellman and prevent them from publishing their work (or maybe I am thinking of some other cryptographic paper or presentation from that era)
Re:A very well deserved award (Score:4, Informative)
That was GCHQ with their implementation:
http://www.ics.uci.edu/~ics54/... [uci.edu]
Diffie and Ellis (Score:3)
Diffie testified in the NewEgg patent troll case [arstechnica.com] and was grilled pretty hard by the attorney, specifically about the work and role of Ellis/GCHQ. He has never tried to deny them credit for their work, but in most practical senses, they didn't invent it.
"Dr. Diffie, you were not the first to invent public key cryptography, were you?"
"I believe that I may have been," said Diffie, speaking cautiously. "But perhaps you could be more specific?"
"In fact, a gentleman named James Ellis in England invented it before you, right?"
Diffie sighed. He seemed, suddenly, almost tired. He had heard this one before. "I spent a lot of time talking to James Ellis, and I can't figure it out," he said. "James Ellis did very fine work."
[...]
"So, in fact, according to the IEEE, someone else invented public key cryptography before you, correct?"
"I disagree," said Diffie. "Ellis' paper is in no sense enabling. [His partner] Malcolm Williamson's paper enables Diffie-Hellman, and it was an internal secret note written two months after I presented that at the largest computer conference in the world."
[...]
"The alleged prior inventors not only kept it secret but did very little with it," said Diffie. "In James Ellis' words to me: 'You did a lot more with it than we did.'"
[...]
"The short answer would be that James Ellis' work in 1969 and 1970 certainly does not teach the methods. Personally, I find that paper incomprehensible. I'm not clear how anybody became convinced of anything from it."
Re:A very well deserved award (Score:4, Interesting)
I attended Hellman's talk in 2014 at "Pohlfest" (celebrating Ira Pohl on his retirement). Hellman flat out said that a Three Letter Agency tried to censor him.
Re: (Score:2)
Re: (Score:2)
pdf at: https://conservancy.umn.edu/bi... [umn.edu]
".... involvement with and the broader context of the debate about the federal government’s cryptography policy—regarding to the National Security Agency’s (NSA) early efforts to contain and discourage academic work in the field"
It is about time. (Score:5, Informative)
It is about time. The primary Diffie-Hellman key exchange https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange [wikipedia.org] is one of the most basic cryptographic algorithms out there and is still used practically today. The simplest version of it is simple enough that you can explain it to a bright 8th grader. Variants of it, including both the original version and others such as those using elliptic curves are mainstays of practical crypto today.
Moreover, DH key exchange along with RSA started modern crypto in a fundamental way. Prior to that work, the idea was to have the key be completely secret and maximize the fundamental entropy of the encrypted messages, leading to the ultimate logical conclusion of the one-time pad. RSA and DH both showed that instead of relying on high entropy, one can rely on the computational difficulty of actually understanding the order that really is in the encrypted message.
The upshot of DH key exchange is that two people (or computers) have a conversation and at the end of it they will have a shared secret, but no one who is listening even if they hear the entire conversation will have any hope of finding out the shared secret unless they have far more computational power. This is a wildly counterintuitive claim once you hear it, and that lasts for about ten minutes (about as long as it takes to explain their algorithm). It is true that DH iand RSA are both only conjecturally secure, since the difficulty of discrete log and factoring would imply that P != NP (and in fact appear to be much stronger claims), and there are some serious thinkers who have expressed skepticism that such systems really are theoretically secure. (See for example Henry Cohn's short essay here http://research.microsoft.com/en-us/um/people/cohn/Thoughts/factoring.html [microsoft.com] which focuses on factoring but most of it applies just as well to discrete log). And we know that if we can ever get practical quantum computers working then DH will be breakable, but the overall impact of this work is absolutely undeniable.
Re: (Score:2)
Agreed, awarding this to them was way overdue. I think Linus Torvalds and John Carmack should get it eventually as well.
Re: (Score:2)
Oh, and add Tim Berners-Lee to that list, he should definitely get it.
Re: (Score:2)
Got to see Whitfield give a talk (Score:2)
"And." The word is "and." (Score:3, Funny)
Crypto Gurus Diffie, Hellman Win 2015 Turing Award
What is the big problem with using the word "and" in a headline? It's the internet. You're not paying per byte and you don't have a fixed width to squeeze your headline into.
Throw off the shackles of your printed media forebears!
Size (Score:1)
I am reading Slashdot on a smartwatch, you insensitive clod!
Re: (Score:2)
Fighting the irrationalities of written English style is an admirable pursuit, but I must warn you that those windmills can take a ridiculous amount of punishment without toppling.
Re: (Score:2)
Exactly! The laws of physics say space colonization is perfectly doable, so we all must be "nutters" for claiming it!
It is the law of economics which has made space colonization difficult, as NASA is eternally choked for money, space colonization will only happen when a corporation takes the risks, and that is not terribly far off either.
Re: (Score:2)
Headline. On physical newspaper, or in the sidebar with related links. Extremely limited in terms of space, so it's an art form to eliminate extraneous words.
God knows writers are happy to more than make up for it in the articles themselves.
Public-key cryptography is the death of freedom (Score:2)
Public-key cryptography is the source of locked-down computers. It's clear that the entire industry is headed toward locking down computers to run only software signed by the conglomerates. Just look at the major operating systems other than non-proprietary Linux. Linux itself is going to face hard times as the hardware that can run it dwindles to the point that only small devices can use it, or devices made (and locked down) by a large corporation.
I truly hope that either quantum computers come along to
Re: (Score:2)
I truly hope that either quantum computers come along to ruin public-key cryptography
Then you'll love Travelling Salesman [imdb.com].
Re: (Score:3)
Re: (Score:2)
The feds are only thwarted by public-key crypto in Apple's case because their hardware on the 5C trusts the software too much. If Apple had designed their hardware crypto correctly in the first place, the software wouldn't matter. The actual device encryption is 100% symmetric-key (and the key derivation probably involves hash functions, which are another beast entirely). However, the lockout / device wipe is in software, and it's that software the feds want to replace. Code signing (public key) stops them
Re: (Score:2)
Can't think of more deserving recipients (Score:4, Interesting)
Re: (Score:3)