Orr Dunkelman: Difference between revisions
Citation bot (talk | contribs) Removed proxy/dead URL that duplicated identifier. | Use this bot. Report bugs. | Suggested by Corvus florensis | #UCB_webform 740/3499 |
|||
Line 30: | Line 30: | ||
== Contributions to cryptanalysis == |
== Contributions to cryptanalysis == |
||
Among his contributions to cryptanalysis are: |
Among his contributions to cryptanalysis are: |
||
* [[Dissection attack]] – joint work with Itai Dinur, Nathan Keller, and [[Adi Shamir]], recipient of the Best Paper Award at the [[Crypto (conference) |Crypto]] 2012 conference.<ref name="Crypto 2012"> {{cite conference |
* [[Dissection attack]] – joint work with Itai Dinur, Nathan Keller, and [[Adi Shamir]], recipient of the Best Paper Award at the [[Crypto (conference) |Crypto]] 2012 conference.<ref name="Crypto 2012"> {{cite conference |chapter= Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems|last1= Dinur|first1= Itai|last2= Dunkelman|first2= Orr|last3 = Keller|first3 = Nathan|last4 = Shamir|first4 = Adi|title= Advances in Cryptology – CRYPTO 2012|series= Lecture Notes in Computer Science|author-link4 = Adi Shamir|publisher= Springer|date = August 2012|volume= 7417| pages= 719–740 |conference= Advances in Cryptology – CRYPTO 2012|doi=10.1007/978-3-642-32009-5_42|isbn=978-3-642-32008-8|editor-last1=Safavi-Naini|editor-first1=Reihaneh|editor-link1=Reihaneh Safavi-Naini|editor-last2=Canetti|editor-first2=Ran|editor-link2=Ran Canetti|conference-url=https://www.iacr.org/conferences/crypto2012/|doi-access= free}}</ref> |
||
* Rectangle attack – joint work with [[Eli Biham]] and Nathan Keller.<ref>{{cite conference |
* Rectangle attack – joint work with [[Eli Biham]] and Nathan Keller.<ref>{{cite conference |chapter= The Rectangle Attack — Rectangling the Serpent|last1= Biham|first1= Eli|author-link1 = Eli Biham|last2= Dunkelman|first2= Orr|last3 = Keller|first3 = Nathan|title= Advances in Cryptology — EUROCRYPT 2001|series= Lecture Notes in Computer Science|publisher= Springer|date = 15 April 2001|volume= 2045| pages= 340–357|conference= Advances in Cryptology — EUROCRYPT 2001|doi=10.1007/3-540-44987-6_21|isbn=978-3-540-42070-5|editor-last1=Pfitzmann|editor-first1=Birgit|conference-url=https://www.iacr.org/archive/eurocrypt2001/eurocrypt-2001.html|doi-access= free}}</ref> |
||
* New variants of [[Differential-linear attack|differential-linear]], [[Boomerang attack|boomerang]], and [[Slide attack|slide]] attacks – joint works with [[Eli Biham]], [[Adi Shamir]], and other co-authors.<ref name="DBLP">{{DBLP | pid = d/OrrDunkelman | name = Orr Dunkelman}}</ref> |
* New variants of [[Differential-linear attack|differential-linear]], [[Boomerang attack|boomerang]], and [[Slide attack|slide]] attacks – joint works with [[Eli Biham]], [[Adi Shamir]], and other co-authors.<ref name="DBLP">{{DBLP | pid = d/OrrDunkelman | name = Orr Dunkelman}}</ref> |
||
* Breaking (together with [[Eli Biham]], Sebastiaan Indesteege, Nathan Keller, and [[Bart Preneel]]) [[KeeLoq]] – a [[block cipher]] used in remote keyless entry systems by multiple companies.<ref>[http://www.cosic.esat.kuleuven.be/keeloq/ How To Steal Cars — A Practical Attack on KeeLoq<!-- Bot generated title -->]</ref><ref>{{cite conference |
* Breaking (together with [[Eli Biham]], Sebastiaan Indesteege, Nathan Keller, and [[Bart Preneel]]) [[KeeLoq]] – a [[block cipher]] used in remote keyless entry systems by multiple companies.<ref>[http://www.cosic.esat.kuleuven.be/keeloq/ How To Steal Cars — A Practical Attack on KeeLoq<!-- Bot generated title -->]</ref><ref>{{cite conference |chapter= A Practical Attack on KeeLoq|last1= Indesteege|first1=Sebastiaan |last2= Keller|first2= Nathan|last3 = Dunkelman|first3 = Orr|last4 = Biham|first4 = Eli|last5 = Preneel|first5 = Bart|title= Advances in Cryptology – EUROCRYPT 2008|series= Lecture Notes in Computer Science| publisher= Springer| pages= 1–18 |conference= Advances in Cryptology – EUROCRYPT 2008|doi=10.1007/978-3-540-78967-3_1|isbn=978-3-540-78966-6|editor-last1=Smart|editor-first1=Nigel|editor-link=Nigel Smart (cryptographer)|conference-url=https://www.iacr.org/conferences/eurocrypt2008/|date=April 2008|volume= 4965|doi-access= free}}</ref> |
||
* Devising (jointly with [[Eli Biham]]) a practical attack on [[A5/1]] – the cipher used in [[GSM]] security mechanisms.<ref>{{cite conference |chapter-url= https://link.springer.com/chapter/10.1007/3-540-44495-5_5|chapter= Cryptanalysis of the A5/1 GSM Stream Cipher|last1= Biham|first1= Eli|last2= Dunkelman|first2= Orr|title= Progress in Cryptology —INDOCRYPT 2000|series= Lecture Notes in Computer Science|author-link1=Eli Biham| publisher= Springer| pages= 43–51 |conference= Progress in Cryptology —INDOCRYPT 2000|doi=10.1007/3-540-44495-5_5|isbn=978-3-540-41452-0|editor-last1=Roy|editor-first1=Bimal|editor-link1=Bimal Kumar Roy|editor-last2=Okamoto|editor-first2=Eiji|date=December 2000|volume= 1977}}</ref> |
* Devising (jointly with [[Eli Biham]]) a practical attack on [[A5/1]] – the cipher used in [[GSM]] security mechanisms.<ref>{{cite conference |chapter-url= https://link.springer.com/chapter/10.1007/3-540-44495-5_5|chapter= Cryptanalysis of the A5/1 GSM Stream Cipher|last1= Biham|first1= Eli|last2= Dunkelman|first2= Orr|title= Progress in Cryptology —INDOCRYPT 2000|series= Lecture Notes in Computer Science|author-link1=Eli Biham| publisher= Springer| pages= 43–51 |conference= Progress in Cryptology —INDOCRYPT 2000|doi=10.1007/3-540-44495-5_5|isbn=978-3-540-41452-0|editor-last1=Roy|editor-first1=Bimal|editor-link1=Bimal Kumar Roy|editor-last2=Okamoto|editor-first2=Eiji|date=December 2000|volume= 1977}}</ref> |
||
* Attacking reduced-round variants of many [[block ciphers]], including [[Advanced Encryption Standard|AES]], [[Serpent (cipher)|Serpent]], [[International Data Encryption Algorithm|IDEA]], [[GOST (block cipher)|GOST]], [[Data Encryption Standard|DES]], [[KASUMI]], [[MISTY1]], [[Camellia (cipher)|Camellia]], [[Skipjack (cipher)|Skipjack]] and others (in joint works with various coauthors).<ref name="DBLP"/> |
* Attacking reduced-round variants of many [[block ciphers]], including [[Advanced Encryption Standard|AES]], [[Serpent (cipher)|Serpent]], [[International Data Encryption Algorithm|IDEA]], [[GOST (block cipher)|GOST]], [[Data Encryption Standard|DES]], [[KASUMI]], [[MISTY1]], [[Camellia (cipher)|Camellia]], [[Skipjack (cipher)|Skipjack]] and others (in joint works with various coauthors).<ref name="DBLP"/> |
Revision as of 07:45, 19 February 2023
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
|
Orr Dunkelman | |
---|---|
אור דונקלמן | |
Born | 1980 |
Alma mater | Technion - Israel Institute of Technology |
Known for | Studies in cryptography and cryptanalysis (invention and breaking of encryption functions) |
Awards | Krill Prize (2014) |
Scientific career | |
Fields | Computer science, cryptography, cryptanalysis |
Institutions | University of Haifa |
Doctoral advisor | Eli Biham |
Orr Dunkelman (Hebrew: אור דונקלמן) is an Israeli cryptographer and cryptanalyst, currently a professor at the University of Haifa Computer Science department.[1] Dunkelman is a co-director of the Center for Cyber Law & Privacy at the University of Haifa and a co-founder of Privacy Israel, an Israeli NGO for promoting privacy in Israel.[1][2]
Biography
Dunkelman received all his degrees at the Technion - Israel Institute of Technology. He received his Ph.D. degree at the age of 25, under the supervision of Eli Biham.[3] Before joining the University of Haifa, Dunkelman held post-doctoral positions at KU Leuven, at École normale supérieure, and at the Weizmann Institute of Science.[1]
Contributions to cryptanalysis
Among his contributions to cryptanalysis are:
- Dissection attack – joint work with Itai Dinur, Nathan Keller, and Adi Shamir, recipient of the Best Paper Award at the Crypto 2012 conference.[4]
- Rectangle attack – joint work with Eli Biham and Nathan Keller.[5]
- New variants of differential-linear, boomerang, and slide attacks – joint works with Eli Biham, Adi Shamir, and other co-authors.[6]
- Breaking (together with Eli Biham, Sebastiaan Indesteege, Nathan Keller, and Bart Preneel) KeeLoq – a block cipher used in remote keyless entry systems by multiple companies.[7][8]
- Devising (jointly with Eli Biham) a practical attack on A5/1 – the cipher used in GSM security mechanisms.[9]
- Attacking reduced-round variants of many block ciphers, including AES, Serpent, IDEA, GOST, DES, KASUMI, MISTY1, Camellia, Skipjack and others (in joint works with various coauthors).[6]
New cryptographic primitives
Dunkelman has taken part in the design of several new cryptographic primitives:
- HAIFA construction (with Eli Biham) – a cryptographic structure used in the design of hash functions.
- KATAN and KTANTAN (with Cristophe De Canniere and Miroslav Knežević) - a family of small and efficient hardware-oriented block ciphers.[10]
- SHAvite-3 (with Eli Biham), a hash function which was one of the 14 semifinalists in the NIST hash function competition.[11]
Awards and honors
Dunkelman received the Krill Prize from the Wolf Foundation in 2014, and papers he co-authored won the Best Paper Award at the Crypto conference (2012) and at the Fast Software Encryption (FSE) conference (2012).[12][4]
References
- ^ a b c Dunkelman, Orr. "Orr Dunkelman's Webpage". Retrieved 2022-05-01.
- ^ "Privacy Israel (founders)". Retrieved 2022-05-01.
- ^ Orr Dunkelman at the Mathematics Genealogy Project
- ^ a b Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi (August 2012). "Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems". In Safavi-Naini, Reihaneh; Canetti, Ran (eds.). Advances in Cryptology – CRYPTO 2012. Advances in Cryptology – CRYPTO 2012. Lecture Notes in Computer Science. Vol. 7417. Springer. pp. 719–740. doi:10.1007/978-3-642-32009-5_42. ISBN 978-3-642-32008-8.
- ^ Biham, Eli; Dunkelman, Orr; Keller, Nathan (15 April 2001). "The Rectangle Attack — Rectangling the Serpent". In Pfitzmann, Birgit (ed.). Advances in Cryptology — EUROCRYPT 2001. Advances in Cryptology — EUROCRYPT 2001. Lecture Notes in Computer Science. Vol. 2045. Springer. pp. 340–357. doi:10.1007/3-540-44987-6_21. ISBN 978-3-540-42070-5.
- ^ a b Orr Dunkelman at DBLP Bibliography Server
- ^ How To Steal Cars — A Practical Attack on KeeLoq
- ^ Indesteege, Sebastiaan; Keller, Nathan; Dunkelman, Orr; Biham, Eli; Preneel, Bart (April 2008). "A Practical Attack on KeeLoq". In Smart, Nigel (ed.). Advances in Cryptology – EUROCRYPT 2008. Advances in Cryptology – EUROCRYPT 2008. Lecture Notes in Computer Science. Vol. 4965. Springer. pp. 1–18. doi:10.1007/978-3-540-78967-3_1. ISBN 978-3-540-78966-6.
- ^ Biham, Eli; Dunkelman, Orr (December 2000). "Cryptanalysis of the A5/1 GSM Stream Cipher". In Roy, Bimal; Okamoto, Eiji (eds.). Progress in Cryptology —INDOCRYPT 2000. Progress in Cryptology —INDOCRYPT 2000. Lecture Notes in Computer Science. Vol. 1977. Springer. pp. 43–51. doi:10.1007/3-540-44495-5_5. ISBN 978-3-540-41452-0.
- ^ De Cannière, Christophe; Dunkelman, Orr; Knežević, Miroslav (September 2009). "KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers". In Clavier, Christophe; Gaj, Kris (eds.). Cryptographic Hardware and Embedded Systems - CHES 2009. Cryptographic Hardware and Embedded Systems - CHES 2009. Lecture Notes in Computer Science. Vol. 5747. Springer. pp. 272–288. doi:10.1007/978-3-642-04138-9_20. ISBN 978-3-642-04137-2.
- ^ Eli Biham; Orr Dunkelman. "The SHAvite-3 Hash Function" (PDF). Retrieved 11 December 2008.
- ^ "Orr Dunkelman's Krill Prize Laureate page at the Wolf Foundation website". 8 January 2020. Retrieved 2022-05-01.
External links
- Dunkelman, Orr. "Orr Dunkelman's homepage at the University of Haifa". Retrieved 2022-05-01.
- "Orr Dunkelman's Krill Prize Laureate page at the Wolf Foundation website". 8 January 2020. Retrieved 2022-05-01.
- Webpage of the Center for Cyber Law & Privacy at the University of Haifa
- Orr Dunkelman at the Mathematics Genealogy Project
- Orr Dunkelman at DBLP Bibliography Server