Jump to content

Paul Carl Kocher

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Martinhellman (talk | contribs) at 16:36, 17 April 2020 (I noticed that Paul's bio mistakenly said he graduated from Stanford in 1991 and double checked with him to ensure that it was 1995. (It was.) I also added a personal recollection, but written in the third person.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Paul C. Kocher
Born (1973-06-11) June 11, 1973 (age 51)
New York
NationalityAmerican
Alma materStanford University
Known forSSL v3.0, differential power analysis, timing attacks, Spectre, brute force hardware, tamper-resistant hardware design
AwardsNAE (2009)
Marconi Prize (2019)
Scientific career
FieldsCryptography
InstitutionsCryptography Research, Inc.

Paul Carl Kocher (born June 11, 1973) is an American cryptographer and cryptography entrepreneur who founded Cryptography Research, Inc. (CRI) and served as its president and chief scientist.

Education and early life

Kocher grew up in Oregon. He received a bachelor's degree in biology from Stanford University in 1995, where he worked part-time with Martin Hellman. According to Hellman, Kocher is mostly self-taught in cryptography and already knew an amazing amount when they first met in Kocher's sophomore year. As demand for Kocher's knowledge in cryptography escalated, he gave up on his original plan to become a veterinarian and founded CRI instead.

Career and research

Kocher was awarded the 2019 Marconi Prize with Taher Elgamal for architecting the Secure Sockets Layer (SSL) 3.0/Transport Layer Security (TLS) 1.0 protocol, a cryptographic protocol for secure communications on the Internet.

He pioneered the field of side-channel attacks, including the development of timing attacks that can break implementations of RSA, DSA and fixed-exponent Diffie–Hellman that operate in non-constant time[1], as well as the co-development of power analysis and differential power analysis[2]. His side-channel attack countermeasure designs are widely deployed in secure integrated circuits and other cryptographic devices.[3] He has also worked on microprocessor security, and co-discovered and named the Spectre vulnerability, which leverages speculative execution and other microprocessor performance optimizations to extract confidential information.

He also helped architect security-related integrated circuits, including Deep Crack, a DES brute-force key search machine.


Honors and awards

Kocher was elected to the U.S. National Academy of Engineering in 2009 for his contributions to cryptography and Internet security. He serves on the National Academies' Forum on Cyber Resilience. [4]

In 2018, Kocher was named a Fellow of the International Association for Cryptologic Research for "fundamental contributions to the study of side-channel attacks and countermeasures, cryptography in practice, and for service to the IACR."[5]

Kocher and Taher Elgamal were jointly awarded the 2019 Marconi Prize for "their development of SSL/TLS and other contributions to the security of communications".[6]

References

  1. ^ Kocher, Paul C (1996). "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems". Annual International Cryptology Conference.
  2. ^ Kocher, Paul C; Jaffe, Joshua; Jun, Benjamin (1999). "Differential Power Analysis". Annual International Cryptology Conference.
  3. ^ "The Sheriff of Cyber City". 2011. Retrieved May 13, 2019.
  4. ^ "Forum on Cyber Resilience". Retrieved May 13, 2019.
  5. ^ "Paul Kocher, IACR Fellow, 2018". 2018. Retrieved May 13, 2019.
  6. ^ "Cryptographers Paul Kocher and Taher Elgamal Awarded The 2019 Marconi Prize".