Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Stanford Encryption Pioneer Who Risked Career Wins Medal

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Political Videos Donate to DU
 
bananas Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 02:24 PM
Original message
Stanford Encryption Pioneer Who Risked Career Wins Medal
 
Run time: 01:55
https://www.youtube.com/watch?v=8zq6R1mYf1c
 
Posted on YouTube: February 05, 2010
By YouTube Member: StanfordUniversity
Views on YouTube: 345
 
Posted on DU: March 11, 2010
By DU Member: bananas
Views on DU: 263
 
Stanford Professor Martin Hellman helped make it possible for companies and ordinary people to encrypt their Internet communications, and he has a story to tell about it.

http://news.stanford.edu/news/2010/february8/hellman-encryption-medal-021010.html

Stanford Report, February 10, 2010
Stanford encryption pioneer who risked career becomes Hamming Medalist

Martin Hellman, professor emeritus of electrical engineering, developed public key cryptography – the technology that makes Internet commerce feasible – with colleagues Whitfield Diffie and Ralph Merkle. They are being honored by the Institute of Electrical and Electronics Engineers.

BY CHRISTINE BLACKMAN

Thirty-five years ago, Martin Hellman, Whitfield Diffie and Ralph Merkle developed an easy method for sending secure messages over insecure channels. With the advent of the Internet, their technology, called public key cryptography, is now used continuously everywhere in the world.

"When a lock icon appears at the bottom of your browser, it's using public key cryptography. Your computer and the merchant's computer can talk back and forth across an insecure channel and exchange credit card information in a way that someone listening in cannot get it," said Hellman, Stanford professor emeritus of electrical engineering.

The Institute of Electrical and Electronics Engineers (IEEE) has named Hellman, Diffie and Merkle the 2010 Richard W. Hamming Medalists. Hellman said he was especially happy that the award recognizes the contribution of Merkle, whose early work on public key encryption didn't get the acknowledgement it deserved.

"Ralph really deserves equal credit with us. I am really glad to see him being recognized on this award," Hellman said.

<snip>


Richard W. Hamming medalists Ralph Merkle, Martin Hellman and Whit Diffie developed the first public key cryptography exchange in 1975.

<snip>

Each of the three medalists became interested in cryptography before they met. Hellman was drawn to coding despite discouragement from almost all of his Stanford colleagues. "They told me I was crazy," Hellman said. "Their arguments were valid: How could I hope to discover anything that the National Security Agency, which is the primary American code-making, code-breaking agency, didn’t already know? And they classified everything so highly that if we came up with anything good, they'd classify it."

Hellman decided to pursue cryptography anyway because he could foresee the day when even buying a loaf of bread would involve an electronic funds transfer, he said. "I didn't care what the NSA knew because I could see a need for commercial encryption that could not be met by the classified literature. Also, it didn’t matter if everything I developed was already known to them. It is well established that the one to publish first gets credit, not the first to discover and keep it secret," he said.

<snip>

As the team began publishing papers in IEEE journals, an IEEE member – who worked for the NSA – sent a letter to the organization, citing Hellman's papers, with concerns about national security laws. Hellman took up the issue with Stanford legal counsel John Schwartz, who explained that the university could defend Hellman in court if it came to that. Penalties could extend to 10 years in prison and a $50,000 fine.

"Schwartz told me that the university could pay all my legal expenses, but if I was judged a criminal and all the appeals were exhausted, they could not aid and abet criminal conduct by paying my fine. And they obviously couldn't go to jail for me," Hellman said.

Hellman had a symposium to attend at Cornell University, at which two of his doctoral students, Merkle and Steve Pohlig, were to present their latest papers. He decided to throw caution to the wind, though some colleagues thought even his life, along with his career, might be in danger. To give proper credit to his students and yet protect them, Hellman presented the paper while they stood silently on stage next to him. He was never arrested.

Public key encryption goes commercial

The NSA's outlook eventually changed, thanks partly to a 1995 National Research Council committee that Hellman joined. The group worked through concerns of both sides of the argument and found that using weak encryption to protect American business and citizens was a greater national threat than allowing both Americans and foreigners to acquire secure encryption.

<snip>


Printer Friendly | Permalink |  | Top
ljm2002 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-11-10 10:48 PM
Response to Original message
1. Hellman was right...
...when he said the issue is who publishes first. Three mathematicians who worked for one of the UK's secret agencies discovered some of the public key encryption techniques before Diffie and Hellman published their paper -- but alas, they could not publish. I don't remember their names, though...

Well here is a brief historical synopsis, but no mention of the Brits:

http://www.ics.uci.edu/~ics54/doc/security/pkhistory.html

Ah, here's a reference - it's GCHQ, not MI5 as I had thought:

http://www.livinginternet.com/i/is_crypt_pkc_inv.htm

<...>
Ellis, Cocks, Williamson. In December, 1997, it was revealed that researchers at the GCHQ organization did some work in the early 1970's in the field of "non-secret encryption", which is related to public key cryptography, but without inclusion of the concept of digital signatures. However, these claims are not verifiable since the work was not published, and there are no evidentiary artifacts available such as original copies of the papers (although modern transcriptions are linked below). Therefore, in keeping with a long tradition, credit for the development and publication of PKC must remain with the researchers who first published their work in the open scientific literature, as described above. The work of the GCHQ researchers is described below as related by James Ellis in his paper The History of Non-Secret Encryption.
<...>

Three teams each with three members - Ellis, Cocks, Williamson; Merkle, Hellman, Diffie; Rivest, Shamir, Adleson. Intriguing.

Anyway, fascinating topic! That is a very nice photo of the three of them, and I'm glad they all got the award.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Apr 25th 2024, 04:53 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Political Videos Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC