Ross J. Anderson
Ross Anderson in 2008
|Born||15 September 1956|
|Institutions||University of Cambridge Computer Laboratory|
|Alma mater||University of Cambridge|
|Thesis||Robust Computer Security (1995)|
|Doctoral advisor||Roger Needham|
|Doctoral students||Markus Kuhn
|Known for||work on banking security, security economics, information policy, Serpent, University of Cambridge politics|
Ross John Anderson, FRS (born 1956) is a researcher, writer, and industry consultant in security engineering. He is ″Cambridge University’s Head of Cryptography″ and Professor in Security Engineering at the University of Cambridge Computer Laboratory where he is engaged in the ″Security Group″.
In 1978, Anderson graduated with a Bachelor of Arts in mathematics and natural science from Trinity College, Cambridge, and subsequently received a qualification in computer engineering. He worked in the avionics and banking industry before moving in 1992 back to the University of Cambridge, to work on his doctorate under the supervision of Roger Needham and start his career as an academic researcher. He received his PhD in 1995, and became a lecturer in the same year. He lives near Sandy, Bedfordshire.
Anderson's research interests are in computer security. In cryptography, he designed with Eli Biham the BEAR, LION and Tiger cryptographic primitives, and coauthored with Biham and Lars Knudsen the block cipher Serpent, one of the finalists in the AES competition. He has also discovered weaknesses in the FISH cipher and designed the stream cipher Pike.
He is well-known among Cambridge academics as an outspoken defender of academic freedoms, intellectual property, and other matters of university politics. He is engaged in the ″Campaign for Cambridge Freedoms″  and has been an elected member of Cambridge University Council since 2002. In January 2004, the student newspaper Varsity declared Anderson to be Cambridge University’s “most powerful person”.
Anderson's TCPA FAQ has been characterized by IBM TC researcher David R. Safford as "full of technical errors" and of "presenting speculation as fact."
For years Anderson has been arguing that by their nature large databases will never be free of abuse by breaches of security. He has said that if a large system is designed for ease of access it becomes insecure; if made watertight it becomes impossible to use. This is sometimes known as Anderson's Rule.
Anderson is the author of Security Engineering, published by Wiley in 2001. He was the founder and editor of Computer and Communications Security Reviews.
After the vast Global surveillance disclosure leaked by Edward Snowden beginning June 2013 Anderson suggested one way to begin stamping out the British state’s unaccountable involvement in this NSA spying scandal is to entirely end the domestic secret services. Anderson: “Were I a legislator, I would simply abolish MI5.” Anderson notes the only way this kind of systemic data collection has been made possible was through the business models of private industry. The value of information-driven web companies such as Facebook and Google is built around their ability to gather vast tracts of data. It was something the intelligence agencies would have struggled with alone.
- Ross Anderson (2008) (in German), [both editions as PDF Security Engineering. A Guide to Building Dependable Distributed Systems] (2. ed.), Wiley, ISBN 978-0-470-06852-6, both editions as PDF
- Ross J. Anderson at the Mathematics Genealogy Project
- Anderson, Ross (2008). Security engineering: a guide to building dependable distributed systems. New York: John Wiley. ISBN 0-470-06852-3.
- The Blue Book – “The Computer Laboratory: an Introduction”, University of Cambridge Computer Laboratory, August 2007
- Curriculum Vitae – Ross Anderson, May 2007
- Anderson, Prof. Ross John, Who's Who 2008, A & C Black, 2008; online edn, Oxford University Press, Dec 2007.
- List of publications from Microsoft Academic Search
- List of publications from Google Scholar
- List of publications from the DBLP Bibliography Server
- Ross Anderson: Why information security is hard – an economic perspective, ACSAC 2001.
- Campaign for Cambridge Freedoms
- Election to the Council: Notices 2 December 2002 and 7 November 2006, Cambridge University Reporter
- Cambridge Power 100, Varsity, Issue 591, 16 January 2004
- Ross Anderson: ‘Trusted Computing’ Frequently Asked Questions, August 2003
- Guardian newspaper article on a security breach, in which Anderson's Rule is formulated
- Cambridge's Head of Cryptography: I Would Abolish MI5, Forbes, 3 January 2013