Now we are able to secure communication over the Internet, trading, are inseparable from the contribution of 2-bit cryptography pioneer.
United States Association for computing (ACM) today announced that grant huaifeide·difei Cryptography and security technical experts at Stanford University (Whitfield Diffie) and Professor Emeritus of electrical engineering at Stanford University Mading·heerman (Martin Hellman) Turing Award in 2015.
Turing Award by United States Association was founded, specialized rewards those who make important contributions to the computer industry, this award is also known as the computer world's Nobel Prize, prize money of us $ 1 million, provided by Google. ACM Awards ceremony will be held in San Francisco on June 11, 2016.
Huaifeide·difei and Mading·heerman (left) pictured in 1977
Entered the era of the Internet, everyone and every day different objects and different platforms, different servers and website links, if the security channel of communication is the key. Huaifeide·difei and Mading·heerman in 1976 of seminal paper new directions in Cryptography (New Directions in Cryptography), public key cryptography decrypted + method was introduced, which is the basis of many network security protocols, guaranteeing people security of Internet communication and financial transactions every day. The evolution of modern cryptography, also plays a big role, the invention is widely seen in the industry in 1976 marks the birth of modern Cryptography.
In 1970, the United States John McCarthy of Stanford University artificial intelligence experts to France Bordeaux took part in an academic conference and will present a paper on the feasibility study of the home terminal. McCarthy predicts that future home information terminal can be connected to the telephone network and sharing computer and computer files can store a variety of information, such as books, magazines, newspapers, schedules, public information and personal information.
When Stanford University artificial intelligence laboratory programmer huaifeide·difei was inspired this report: the future of the Internet world of what is required to ensure public safety? In 1976, he cooperated with Mading·heerman, invented the famous "public key cryptography" commercialization of this technology in about 20 years for the World Wide Web became a possibility.
United States Chairman of the Association for computing machinery Association yalishanda·woerfu (Alexander L.Wolf) results for the awards said: "40 years ago, huaifeide·difei and Mading·heerman are predictably came up with today's Internet development: people as a result of contact through the Internet disclosure of privacy information or been tampered with. Today, science has become a country that is encrypted security, the important issue of the relationship between Government and enterprises, large amounts of money being put into research and development of cryptology. "
The new direction of cryptography
Electronic Frontier Foundation founder one of yuehan·jiermo (John Gilmore) foreign said: "huaifeide·difei and Mading·heerman ought to get this award, they design out of not symmetric encryption system like a ' mathematics quirks ', these quirks on like a ' live door function ', you can from a direction calculation, if you some local information also can from another direction calculation, but if you no, is hard from another direction unlock mystery. "
United States Academy of engineering andelie·buluode (Andrei Broder) said of the Turing Award: "the protection of private data, depend on confirmation of information, owner information, and to ensure the integrity and confidentiality of communications. These widely used way is in the arms of feide·difei and Mading·heerman ideas and methods have been developed. "
Any Internet user may use public key encryption are no strangers to establish a secure connection to the matter. A typical secure URL begins with HTTPS, which s meant using a secure transport layer protocol (Secure Transport Layer Protocol) to encrypt the information exchange. This secure connection is established: the public key encrypted transmission of a symmetric key that is encrypted, the transport keys can be used to encrypt the following Exchange of information.
It is worth mentioning that this public key cryptography algorithm used in network connections, also used in the iPhone mobile application running on the iPhone application to Apple certified. Therefore, Apple recently with the United States Department of Justice argued similar with passwords that year, they were asked to set aside the back door. Herman said: "crack a phone smaller, but once the precedent is endless. Because this will pose a huge threat to information encryption security. "
United States Federal Bureau of investigation between Apple and the password is also an important reason for this year's Turing Award attracted widespread attention, FBI unable to crack the Apple iPhone cell phone numbers stored in information encryption system, ordered the Apple help to unravel Bernard Ting Connaught terrorist attack the killer of Farouk iPhone5C smart phone password, to allow the Government to obtain information. Apple declined to provide mobile phone encryption "key".
Apple's CEO Tim Cook has hinted the unprecedented request by the Government, could threaten information security for all iPhone users, Farouk cell phones could be the first Domino. Apple stands behind the entire technology sector. United States Electronic Frontier Foundation today supports the company statement: Government required Apple to create a primary key, good to unlock a cell phone. Once this key is created, we can be sure, the Government will again ask to unlock other phones, and use such powers against provides strong security equipment of any kind. Joseph Esherick KMT regime change in 1943 has
The huaifeide·difei and Mading·heerman will be on the Apple side, is now both Stanford University Center for international security and cooperation (CISAC) member of, participates regularly in a wide variety of seminars on national security issues. Huaifeide·difei is committed to research in computer security, has repeatedly called on to strengthen the protection of personal privacy in the digital age. The Apple challenge the United States Government, issued a statement Mading·heerman foreign: I do not think that we should be asked to do by the Government, this will be the beginning of a dangerous.
No comments:
Post a Comment