Jump to content

Daniel J. Bernstein: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m →‎Further reading: Fixing CNET links, replaced: news.com.com → news.cnet.com using AWB (10274)
→‎Mathematics: Correct singular/plural error
Line 62: Line 62:
He is also the author of the mathematical [[Library (computer science)|libraries]] DJBFFT, a fast portable [[Fast Fourier Transform|FFT]] library, and of primegen, an asymptotically fast small prime [[Sieve theory|sieve]] with low memory footprint based on the [[sieve of Atkin]] rather than the more usual [[sieve of Eratosthenes]]. Both have been used effectively to aid the search for large [[prime numbers]].
He is also the author of the mathematical [[Library (computer science)|libraries]] DJBFFT, a fast portable [[Fast Fourier Transform|FFT]] library, and of primegen, an asymptotically fast small prime [[Sieve theory|sieve]] with low memory footprint based on the [[sieve of Atkin]] rather than the more usual [[sieve of Eratosthenes]]. Both have been used effectively to aid the search for large [[prime numbers]].


In [[algebraic geometry]], he introduced, in 2007, the [[Twisted Edwards curve]], that are plane models of [[elliptic curve]]s, a generalisation of [[Edwards curve]]s. This is used in its [[Curve25519]] [[elliptic curve cryptography]], and its Ed25519 implementation of [[EdDSA]].
In [[algebraic geometry]], he introduced, in 2007, the [[Twisted Edwards curve|Twisted Edwards curves]], that are plane models of [[elliptic curve]]s, a generalisation of [[Edwards curve]]s. This is used in its [[Curve25519]] [[elliptic curve cryptography]], and its Ed25519 implementation of [[EdDSA]].


== Other work ==
== Other work ==

Revision as of 12:43, 9 July 2014

Daniel J. Bernstein
Born (1971-10-29) October 29, 1971 (age 52)
NationalityAmerican
Alma materUniversity of California, Berkeley
New York University
Known forqmail, djbdns
Scientific career
FieldsMathematics
InstitutionsUniversity of Illinois at Chicago
Doctoral advisorHendrik Lenstra
Websitehttp://cr.yp.to/djb.html

Daniel Julius Bernstein (sometimes known simply as djb; born October 29, 1971) is a mathematician, cryptologist, programmer, and professor of mathematics and computer science at the Eindhoven University of Technology and research professor at the University of Illinois at Chicago. He is the author of the computer software programs qmail, publicfile, and djbdns.

Early life

He attended Bellport High School, a public high school on Long Island, and graduated at 15 in 1987.[2] The same year, he ranked fifth place in the Westinghouse Science Talent Search.[3] In 1987 (at the age of 16), he achieved a Top 10 ranking in the William Lowell Putnam Mathematical Competition.[4] Bernstein earned his bachelor's degree in mathematics from New York University (1991) and has a PhD in mathematics from the University of California, Berkeley (1995), where he studied under Hendrik Lenstra.

Bernstein v. United States

Bernstein brought the court case Bernstein v. United States. The ruling in the case declared software as protected speech under the First Amendment, and national restrictions on encryption software were overturned. Bernstein was originally represented by the Electronic Frontier Foundation, but he later represented himself despite having no formal training as a lawyer.[5]

Software security

In the autumn of 2004, Bernstein taught a course about computer software security, titled "UNIX Security Holes". The sixteen members of the class discovered 91 new UNIX security holes. Bernstein, long a promoter of the idea that full disclosure is the best method to promote software security and founder of the securesoftware mailing list, publicly announced 44 of them with sample exploit code.

Bernstein explained, in 2005, that he is pursuing a strategy to "produce invulnerable computer systems". He plans to achieve this by putting the vast majority of computer software into an "extreme sandbox" that only allows it to transform input into output, and by writing bugfree replacements (like qmail and djbdns) for the remaining components that need additional privileges. He concludes: "I won’t be satisfied until I've put the entire security industry out of work."[6]

In spring 2005 Bernstein taught a course on "high speed cryptography".[7] He demonstrated new results against implementations of AES (cache attacks) in the same time period.[8]

As of April 2008,[9] djb's stream cipher "Salsa20" was selected as a member of the final portfolio of the eSTREAM project, part of a European Union research directive.

Secure software

Bernstein has written a number of security-aware programs, including:

Bernstein offers a security guarantee for qmail and djbdns; while some claim there is a dispute over a reported potential qmail exploit, a functioning exploit targeting qmail running on 64-bit platforms has been published.[10][11] Bernstein claims that the exploit does not fall within the parameters of the qmail security guarantee. In March 2009, Bernstein awarded $1000 to Matthew Dempsky for finding a security hole in djbdns.[12]

In August 2008, Bernstein announced[13] DNSCurve, a proposal to secure the Domain Name System. DNSCurve uses techniques from elliptic curve cryptography to give a vast decrease in computational time over the RSA public-key algorithm used by DNSSEC, and uses the existing DNS hierarchy to propagate trust by embedding public keys into specially formatted (but backward-compatible) DNS records.

Mathematics

Bernstein has published a number of papers in mathematics and computation. Many of his papers deal with algorithms or implementations. He also wrote a survey titled "Multidigit multiplication for mathematicians".[14]

In 2001 Bernstein circulated "Circuits for integer factorization: a proposal,"[15] which caused a stir as it potentially suggested that if physical hardware implementations could be close to their theoretical efficiency, then perhaps current views about how large numbers have to be before they are impractical to factor might be off by a factor of three. Thus as 512-bit RSA was then breakable, then perhaps 1536-bit RSA would be too. Bernstein was careful not to make any actual predictions, and emphasized the importance of correctly interpreting asymptotic expressions. However, several other important names in the field, Arjen Lenstra, Adi Shamir, Jim Tomlinson, and Eran Tromer disagreed strongly with Bernstein's conclusions.[16] Bernstein has received funding to investigate whether this potential can be realized.

He is also the author of the mathematical libraries DJBFFT, a fast portable FFT library, and of primegen, an asymptotically fast small prime sieve with low memory footprint based on the sieve of Atkin rather than the more usual sieve of Eratosthenes. Both have been used effectively to aid the search for large prime numbers.

In algebraic geometry, he introduced, in 2007, the Twisted Edwards curves, that are plane models of elliptic curves, a generalisation of Edwards curves. This is used in its Curve25519 elliptic curve cryptography, and its Ed25519 implementation of EdDSA.

Other work

Bernstein proposed Internet Mail 2000, an alternative system for electronic mail, intended to replace Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP3) and Internet Message Access Protocol (IMAP).[17]

He is the primary author of a book on post-quantum cryptography.[18]

See also

Notes

  1. ^ CV
  2. ^ "New Yorkers Excel In Contest". New York Times. 1987-01-21. Retrieved November 9, 2008.
  3. ^ "TWO GIRLS WIN WESTINGHOUSE COMPETITION". New York Times. 1987-01-21. Retrieved March 14, 2011.
  4. ^ L. F. Klosinski; G. L. Alexanderson; L. C. Larson (Oct 1988). "The William Lowell Putnam Mathematical Competition". The American Mathematical Monthly. Vol. 95, no. 8. pp. 717–727. JSTOR 2322251.
  5. ^ [1]
  6. ^ Daniel J. Bernstein (2005-01-07). "Selected Research Activities" (PDF). {{cite journal}}: Cite journal requires |journal= (help)
  7. ^ Daniel J. Bernstein. "MCS 590, High-Speed Cryptography, Spring 2005". Authenticators and signatures. Retrieved September 23, 2005.
  8. ^ Daniel J. Bernstein (2004-04-17). "Cache timing attacks on AES" (PDF). cd9faae9bd5308c440df50fc26a517b4. {{cite journal}}: Cite journal requires |journal= (help)
  9. ^ Steve Babbage, Christophe De Canniere, Anne Canteaut, Carlos Cid, Henri Gilbert, Thomas Johansson, Matthew Parker, Bart Preneel, Vincent Rijmen, and Matthew Robshaw. "The eSTREAM Portfolio" (PDF). Retrieved April 28, 2010.{{cite web}}: CS1 maint: multiple names: authors list (link)
  10. ^ Georgi Guninski (2005-05-31). "Georgi Guninski security advisory #74, 2005". Retrieved September 23, 2005.
  11. ^ James Craig Burley (2005-05-31). "My Take on Georgi Guninski's qmail Security Advisories".
  12. ^ Daniel J. Bernstein (2009-03-04). "djbdns<=1.05 lets AXFRed subdomains overwrite domains".
  13. ^ Daniel J. Bernstein. "High-speed cryptography".
  14. ^ Daniel J. Bernstein (2001-08-11). "Multidigit multiplication for mathematicians". {{cite journal}}: Cite journal requires |journal= (help)
  15. ^ Daniel J. Bernstein (2001-11-09). "Circuits for integer factorization: a proposal". {{cite journal}}: Cite journal requires |journal= (help)
  16. ^ Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, and Eran Tromer (2002). "Analysis of Bernstein's Factorization Circuit". proc. Asiacrypt. LNCS 2501: 1–26.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  17. ^ [2]
  18. ^ https://www.springer.com/mathematics/numbers/book/978-3-540-88701-0

Further reading

External links

Template:Persondata