Orr Dunkelman: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Citation bot (talk | contribs)
Removed proxy/dead URL that duplicated identifier. | Use this bot. Report bugs. | Suggested by Corvus florensis | #UCB_webform 740/3499
Line 30: Line 30:
== Contributions to cryptanalysis ==
== Contributions to cryptanalysis ==
Among his contributions to cryptanalysis are:
Among his contributions to cryptanalysis are:
* [[Dissection attack]] – joint work with Itai Dinur, Nathan Keller, and [[Adi Shamir]], recipient of the Best Paper Award at the [[Crypto (conference) |Crypto]] 2012 conference.<ref name="Crypto 2012"> {{cite conference |chapter-url= https://link.springer.com/chapter/10.1007/978-3-642-32009-5_42|chapter= Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems|last1= Dinur|first1= Itai|last2= Dunkelman|first2= Orr|last3 = Keller|first3 = Nathan|last4 = Shamir|first4 = Adi|title= Advances in Cryptology – CRYPTO 2012|series= Lecture Notes in Computer Science|author-link4 = Adi Shamir|publisher= Springer|date = August 2012|volume= 7417| pages= 719–740 |conference= Advances in Cryptology – CRYPTO 2012|doi=10.1007/978-3-642-32009-5_42|isbn=978-3-642-32008-8|editor-last1=Safavi-Naini|editor-first1=Reihaneh|editor-link1=Reihaneh Safavi-Naini|editor-last2=Canetti|editor-first2=Ran|editor-link2=Ran Canetti|conference-url=https://www.iacr.org/conferences/crypto2012/|doi-access= free}}</ref>
* [[Dissection attack]] – joint work with Itai Dinur, Nathan Keller, and [[Adi Shamir]], recipient of the Best Paper Award at the [[Crypto (conference) |Crypto]] 2012 conference.<ref name="Crypto 2012"> {{cite conference |chapter= Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems|last1= Dinur|first1= Itai|last2= Dunkelman|first2= Orr|last3 = Keller|first3 = Nathan|last4 = Shamir|first4 = Adi|title= Advances in Cryptology – CRYPTO 2012|series= Lecture Notes in Computer Science|author-link4 = Adi Shamir|publisher= Springer|date = August 2012|volume= 7417| pages= 719–740 |conference= Advances in Cryptology – CRYPTO 2012|doi=10.1007/978-3-642-32009-5_42|isbn=978-3-642-32008-8|editor-last1=Safavi-Naini|editor-first1=Reihaneh|editor-link1=Reihaneh Safavi-Naini|editor-last2=Canetti|editor-first2=Ran|editor-link2=Ran Canetti|conference-url=https://www.iacr.org/conferences/crypto2012/|doi-access= free}}</ref>
* Rectangle attack – joint work with [[Eli Biham]] and Nathan Keller.<ref>{{cite conference |chapter-url= https://link.springer.com/chapter/10.1007/3-540-44987-6_21|chapter= The Rectangle Attack — Rectangling the Serpent|last1= Biham|first1= Eli|author-link1 = Eli Biham|last2= Dunkelman|first2= Orr|last3 = Keller|first3 = Nathan|title= Advances in Cryptology — EUROCRYPT 2001|series= Lecture Notes in Computer Science|publisher= Springer|date = 15 April 2001|volume= 2045| pages= 340–357|conference= Advances in Cryptology — EUROCRYPT 2001|doi=10.1007/3-540-44987-6_21|isbn=978-3-540-42070-5|editor-last1=Pfitzmann|editor-first1=Birgit|conference-url=https://www.iacr.org/archive/eurocrypt2001/eurocrypt-2001.html|doi-access= free}}</ref>
* Rectangle attack – joint work with [[Eli Biham]] and Nathan Keller.<ref>{{cite conference |chapter= The Rectangle Attack — Rectangling the Serpent|last1= Biham|first1= Eli|author-link1 = Eli Biham|last2= Dunkelman|first2= Orr|last3 = Keller|first3 = Nathan|title= Advances in Cryptology — EUROCRYPT 2001|series= Lecture Notes in Computer Science|publisher= Springer|date = 15 April 2001|volume= 2045| pages= 340–357|conference= Advances in Cryptology — EUROCRYPT 2001|doi=10.1007/3-540-44987-6_21|isbn=978-3-540-42070-5|editor-last1=Pfitzmann|editor-first1=Birgit|conference-url=https://www.iacr.org/archive/eurocrypt2001/eurocrypt-2001.html|doi-access= free}}</ref>
* New variants of [[Differential-linear attack|differential-linear]], [[Boomerang attack|boomerang]], and [[Slide attack|slide]] attacks – joint works with [[Eli Biham]], [[Adi Shamir]], and other co-authors.<ref name="DBLP">{{DBLP | pid = d/OrrDunkelman | name = Orr Dunkelman}}</ref>
* New variants of [[Differential-linear attack|differential-linear]], [[Boomerang attack|boomerang]], and [[Slide attack|slide]] attacks – joint works with [[Eli Biham]], [[Adi Shamir]], and other co-authors.<ref name="DBLP">{{DBLP | pid = d/OrrDunkelman | name = Orr Dunkelman}}</ref>
* Breaking (together with [[Eli Biham]], Sebastiaan Indesteege, Nathan Keller, and [[Bart Preneel]]) [[KeeLoq]] – a [[block cipher]] used in remote keyless entry systems by multiple companies.<ref>[http://www.cosic.esat.kuleuven.be/keeloq/ How To Steal Cars — A Practical Attack on KeeLoq<!-- Bot generated title -->]</ref><ref>{{cite conference |chapter-url= https://link.springer.com/chapter/10.1007/978-3-540-78967-3_1|chapter= A Practical Attack on KeeLoq|last1= Indesteege|first1=Sebastiaan |last2= Keller|first2= Nathan|last3 = Dunkelman|first3 = Orr|last4 = Biham|first4 = Eli|last5 = Preneel|first5 = Bart|title= Advances in Cryptology – EUROCRYPT 2008|series= Lecture Notes in Computer Science| publisher= Springer| pages= 1–18 |conference= Advances in Cryptology – EUROCRYPT 2008|doi=10.1007/978-3-540-78967-3_1|isbn=978-3-540-78966-6|editor-last1=Smart|editor-first1=Nigel|editor-link=Nigel Smart (cryptographer)|conference-url=https://www.iacr.org/conferences/eurocrypt2008/|date=April 2008|volume= 4965|doi-access= free}}</ref>
* Breaking (together with [[Eli Biham]], Sebastiaan Indesteege, Nathan Keller, and [[Bart Preneel]]) [[KeeLoq]] – a [[block cipher]] used in remote keyless entry systems by multiple companies.<ref>[http://www.cosic.esat.kuleuven.be/keeloq/ How To Steal Cars — A Practical Attack on KeeLoq<!-- Bot generated title -->]</ref><ref>{{cite conference |chapter= A Practical Attack on KeeLoq|last1= Indesteege|first1=Sebastiaan |last2= Keller|first2= Nathan|last3 = Dunkelman|first3 = Orr|last4 = Biham|first4 = Eli|last5 = Preneel|first5 = Bart|title= Advances in Cryptology – EUROCRYPT 2008|series= Lecture Notes in Computer Science| publisher= Springer| pages= 1–18 |conference= Advances in Cryptology – EUROCRYPT 2008|doi=10.1007/978-3-540-78967-3_1|isbn=978-3-540-78966-6|editor-last1=Smart|editor-first1=Nigel|editor-link=Nigel Smart (cryptographer)|conference-url=https://www.iacr.org/conferences/eurocrypt2008/|date=April 2008|volume= 4965|doi-access= free}}</ref>
* Devising (jointly with [[Eli Biham]]) a practical attack on [[A5/1]] – the cipher used in [[GSM]] security mechanisms.<ref>{{cite conference |chapter-url= https://link.springer.com/chapter/10.1007/3-540-44495-5_5|chapter= Cryptanalysis of the A5/1 GSM Stream Cipher|last1= Biham|first1= Eli|last2= Dunkelman|first2= Orr|title= Progress in Cryptology —INDOCRYPT 2000|series= Lecture Notes in Computer Science|author-link1=Eli Biham| publisher= Springer| pages= 43–51 |conference= Progress in Cryptology —INDOCRYPT 2000|doi=10.1007/3-540-44495-5_5|isbn=978-3-540-41452-0|editor-last1=Roy|editor-first1=Bimal|editor-link1=Bimal Kumar Roy|editor-last2=Okamoto|editor-first2=Eiji|date=December 2000|volume= 1977}}</ref>
* Devising (jointly with [[Eli Biham]]) a practical attack on [[A5/1]] – the cipher used in [[GSM]] security mechanisms.<ref>{{cite conference |chapter-url= https://link.springer.com/chapter/10.1007/3-540-44495-5_5|chapter= Cryptanalysis of the A5/1 GSM Stream Cipher|last1= Biham|first1= Eli|last2= Dunkelman|first2= Orr|title= Progress in Cryptology —INDOCRYPT 2000|series= Lecture Notes in Computer Science|author-link1=Eli Biham| publisher= Springer| pages= 43–51 |conference= Progress in Cryptology —INDOCRYPT 2000|doi=10.1007/3-540-44495-5_5|isbn=978-3-540-41452-0|editor-last1=Roy|editor-first1=Bimal|editor-link1=Bimal Kumar Roy|editor-last2=Okamoto|editor-first2=Eiji|date=December 2000|volume= 1977}}</ref>
* Attacking reduced-round variants of many [[block ciphers]], including [[Advanced Encryption Standard|AES]], [[Serpent (cipher)|Serpent]], [[International Data Encryption Algorithm|IDEA]], [[GOST (block cipher)|GOST]], [[Data Encryption Standard|DES]], [[KASUMI]], [[MISTY1]], [[Camellia (cipher)|Camellia]], [[Skipjack (cipher)|Skipjack]] and others (in joint works with various coauthors).<ref name="DBLP"/>
* Attacking reduced-round variants of many [[block ciphers]], including [[Advanced Encryption Standard|AES]], [[Serpent (cipher)|Serpent]], [[International Data Encryption Algorithm|IDEA]], [[GOST (block cipher)|GOST]], [[Data Encryption Standard|DES]], [[KASUMI]], [[MISTY1]], [[Camellia (cipher)|Camellia]], [[Skipjack (cipher)|Skipjack]] and others (in joint works with various coauthors).<ref name="DBLP"/>

Revision as of 07:45, 19 February 2023


Orr Dunkelman
אור דונקלמן
Born1980
Alma materTechnion - Israel Institute of Technology
Known forStudies in cryptography and cryptanalysis (invention and breaking of encryption functions)
AwardsKrill Prize (2014)
Scientific career
FieldsComputer science, cryptography, cryptanalysis
InstitutionsUniversity of Haifa
Doctoral advisorEli Biham

Orr Dunkelman (Hebrew: אור דונקלמן) is an Israeli cryptographer and cryptanalyst, currently a professor at the University of Haifa Computer Science department.[1] Dunkelman is a co-director of the Center for Cyber Law & Privacy at the University of Haifa and a co-founder of Privacy Israel, an Israeli NGO for promoting privacy in Israel.[1][2]

Biography

Dunkelman received all his degrees at the Technion - Israel Institute of Technology. He received his Ph.D. degree at the age of 25, under the supervision of Eli Biham.[3] Before joining the University of Haifa, Dunkelman held post-doctoral positions at KU Leuven, at École normale supérieure, and at the Weizmann Institute of Science.[1]

Contributions to cryptanalysis

Among his contributions to cryptanalysis are:

New cryptographic primitives

Dunkelman has taken part in the design of several new cryptographic primitives:

Awards and honors

Dunkelman received the Krill Prize from the Wolf Foundation in 2014, and papers he co-authored won the Best Paper Award at the Crypto conference (2012) and at the Fast Software Encryption (FSE) conference (2012).[12][4]

References

  1. ^ a b c Dunkelman, Orr. "Orr Dunkelman's Webpage". Retrieved 2022-05-01.
  2. ^ "Privacy Israel (founders)". Retrieved 2022-05-01.
  3. ^ Orr Dunkelman at the Mathematics Genealogy Project
  4. ^ a b Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi (August 2012). "Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems". In Safavi-Naini, Reihaneh; Canetti, Ran (eds.). Advances in Cryptology – CRYPTO 2012. Advances in Cryptology – CRYPTO 2012. Lecture Notes in Computer Science. Vol. 7417. Springer. pp. 719–740. doi:10.1007/978-3-642-32009-5_42. ISBN 978-3-642-32008-8.
  5. ^ Biham, Eli; Dunkelman, Orr; Keller, Nathan (15 April 2001). "The Rectangle Attack — Rectangling the Serpent". In Pfitzmann, Birgit (ed.). Advances in Cryptology — EUROCRYPT 2001. Advances in Cryptology — EUROCRYPT 2001. Lecture Notes in Computer Science. Vol. 2045. Springer. pp. 340–357. doi:10.1007/3-540-44987-6_21. ISBN 978-3-540-42070-5.
  6. ^ a b Orr Dunkelman at DBLP Bibliography Server
  7. ^ How To Steal Cars — A Practical Attack on KeeLoq
  8. ^ Indesteege, Sebastiaan; Keller, Nathan; Dunkelman, Orr; Biham, Eli; Preneel, Bart (April 2008). "A Practical Attack on KeeLoq". In Smart, Nigel (ed.). Advances in Cryptology – EUROCRYPT 2008. Advances in Cryptology – EUROCRYPT 2008. Lecture Notes in Computer Science. Vol. 4965. Springer. pp. 1–18. doi:10.1007/978-3-540-78967-3_1. ISBN 978-3-540-78966-6.
  9. ^ Biham, Eli; Dunkelman, Orr (December 2000). "Cryptanalysis of the A5/1 GSM Stream Cipher". In Roy, Bimal; Okamoto, Eiji (eds.). Progress in Cryptology —INDOCRYPT 2000. Progress in Cryptology —INDOCRYPT 2000. Lecture Notes in Computer Science. Vol. 1977. Springer. pp. 43–51. doi:10.1007/3-540-44495-5_5. ISBN 978-3-540-41452-0.
  10. ^ De Cannière, Christophe; Dunkelman, Orr; Knežević, Miroslav (September 2009). "KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers". In Clavier, Christophe; Gaj, Kris (eds.). Cryptographic Hardware and Embedded Systems - CHES 2009. Cryptographic Hardware and Embedded Systems - CHES 2009. Lecture Notes in Computer Science. Vol. 5747. Springer. pp. 272–288. doi:10.1007/978-3-642-04138-9_20. ISBN 978-3-642-04137-2.
  11. ^ Eli Biham; Orr Dunkelman. "The SHAvite-3 Hash Function" (PDF). Retrieved 11 December 2008.
  12. ^ "Orr Dunkelman's Krill Prize Laureate page at the Wolf Foundation website". 8 January 2020. Retrieved 2022-05-01.

External links