Hugo Krawczyk

Hugo Krawczyk is an Argentine Israeli cryptographer best known for co-inventing the HMAC message authentication algorithm and contributing to the cryptographic architecture of many Internet standards, including IPsec, IKE, and SSL/TLS.[1]

Hugo Krawczyk
NationalityArgentinean
CitizenshipArgentina
OccupationCryptographer

Education

Krawczyk acquired a Bachelor of Arts with a specialization in Mathematics from the University of Haifa. Later he received his Master of Arts and Ph.D. in Computer Science from Technion - Israel Institute of Technology.

Career

Hugo Krawczyk works at the Algorand Foundation as a Research Fellow. Prior to that, he worked at the IBM T.J. Watson Research Center as an IBM Fellow and Distinguished Research Staff Member, where he was a member of the cryptography research group from 1992 to 1997 and again from 2004 to 2019.[2] He also worked as an Associate Professor in the Department of Electrical Engineering at the Technion in Israel from 1997 until 2004.[3][4]

Hugo's research interests include both theoretical and applied elements of cryptography, with a focus on network security, privacy, and authentication.[5] TLS 1.3, the next-generation TLS, and HKDF, the emerging standard for key derivation embraced by TLS 1.3, Signal, WhatsApp, Facebook Messenger, and others, are among his most recent projects in this area.[6][7]

Select publications

  • 1988: On the Existence of Pseudorandom Generators
  • 1993: The Shrinking Generator
  • 1993: Secret Sharing Made Short
  • 1994: LFSR-based Hashing and Authentication
  • 1995: Proactive secret sharing or: How to cope with perpetual leakage
  • 1996: SKEME: A versatile secure key exchange mechanism for internet
  • 1996: On the composition of zero-knowledge proof systems
  • 1997: Proactive public key and signature systems
  • 1997: MMH: Software Message Authentication in the Gbit/Second Rates
  • 1998: Chameleon Hashing and Signatures
  • 2001: Analysis of key-exchange protocols and their use for building secure channels
  • 2001: The order of encryption and authentication for protecting communications (Or: how secure is SSL?)
  • 2002: Security Analysis of IKE's Signature-based Key-Exchange Protocol
  • 2002: Security analysis of IKE’s signature-based key-exchange protocol
  • 2003 SIGMA: The ‘SIGn-and-MAc’approach to authenticated Diffie-Hellman and its use in the IKE protocols
  • 2003: SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols
  • 2005: HMQV: A High-Performance Secure Diffie-Hellman Protocol
  • 2007: Secure distributed key generation for discrete-log based cryptosystems
  • 2010: Cryptographic Extraction and Key Derivation: The HKDF Scheme
  • 2013: On the Security of the TLS Protocol: A Systematic Analysis
  • 2013: Highly-scalable searchable symmetric encryption with support for boolean queries
  • 2015: The OPTLS Protocol and TLS 1.3
  • 2018: OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks
  • 2020: Can a Blockchain Keep a Secret?

Awards

Krawczyk has won the RSA Conference Award for Excellence in the Field of Mathematics in 2015, the Levchin Prize for Contributions to Real-World Cryptography in 2018, and two IBM corporate honors.

References

  1. "Hugo Krawczyk". scholar.google.com. Retrieved 30 December 2021.
  2. "IBM - 2017 Fellow Hugo M. Krawczyk - United States". www.ibm.com. 13 April 2017. Retrieved 30 December 2021.
  3. "Hugo Krawczyk | Simons Institute for the Theory of Computing". simons.berkeley.edu. Retrieved 30 December 2021.
  4. "author". ieeexplore.ieee.org. Retrieved 30 December 2021.
  5. "hugo-krawczyk". rsaconference.com. Retrieved 30 December 2021.
  6. "Hugo Krawczyk". www.iacr.org. Retrieved 30 December 2021.
  7. "Hugo-Krawczyk". researchgate.net. Retrieved 30 December 2021.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.