Eli Biham
Eli Biham (Hebrew: אלי ביהם) is an Israeli cryptographer and cryptanalyst who is a professor at the Technion - Israel Institute of Technology Computer Science department. From 2008 to 2013, Biham was the dean of the Technion Computer Science department, after serving for two years as chief of CS graduate school. Biham invented (publicly) differential cryptanalysis,[1] for which he received his Ph.D., while working under Adi Shamir. It had been invented before by a team at IBM during their Data Encryption Standard work; the National Security Agency told IBM to keep the discovery secret.
Eli Biham | |
---|---|
אלי ביהם | |
Born | 1960 |
Nationality | Israeli |
Alma mater | Tel Aviv University, Weizmann Institute |
Known for | Studies in cryptography and cryptanalysis (invention and breaking of Encryption functions), specifically Differential cryptanalysis |
Scientific career | |
Fields | Computer science |
Institutions | Technion – Israel Institute of Technology |
Doctoral advisor | Adi Shamir |
Contributions to cryptanalysis
- differential cryptanalysis - publicly invented during his Ph.D. studies under Adi Shamir
- Attacking all triple modes of operation.
- impossible differential cryptanalysis - joint work with Adi Shamir and Alex Biryukov
- Breaking (together with Lars Knudsen) the ANSI X9.52 CBCM mode (few days before the final standardization)
- Breaking the GSM security mechanisms (with Elad Barkan and Nathan Keller)
- Co-invention of related-key attacks.
- Differential Fault Analysis - joint work with Adi Shamir
New cryptographic primitives
Biham has taken part in the design of several new cryptographic primitives:
- Serpent (with Ross Anderson and Lars Knudsen), a block cipher which was one of the final five contenders to become the Advanced Encryption Standard
- Tiger (with Ross Anderson), a hash function fast on 64-bit machines, and
- Py (with Jennifer Seberry), one of a family of fast stream ciphers (see article for more detail on their cryptanalytic status).
- SHAvite-3 (with Orr Dunkelman), a hash function which was one of the 14 semifinalists in the NIST hash function competition.
References
External links
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.