Matthew D. Green

Matthew Daniel Green
Born Hanover, New Hampshire, USA
Residence Baltimore, MD
Citizenship American
Fields Computer Science
Cryptography
Institutions Johns Hopkins University
Alma mater Johns Hopkins University
Oberlin College
Known for Zerocoin, Zerocash, TrueCrypt Audit

Matthew Daniel Green (born 1976) is a cryptographer and security technologist. Green is an Assistant Professor of Computer Science at the Johns Hopkins Information Security Institute. He specializes in applied cryptography, privacy-enhanced information storage systems, anonymous cryptocurrencies, elliptic curve crypto-systems, and satellite television piracy. He is a member of the teams that developed the Zerocoin anonymous cryptocurrency[1] and Zerocash[2] He has been involved in the groups that exposed vulnerabilities in RSA BSafe,[3] Speedpass and EZpass.[4]

Education

Green received a B.S. from Oberlin College (Computer Science), a B.M. from Oberlin College (Electronic Music), a Masters from Johns Hopkins University (Computer Science), and a PhD from Johns Hopkins University (Computer Science). His dissertation was titled Cryptography for Secure and Private Databases: Enabling Practical Data Access without Compromising Privacy.

Blog

Green is the author of the Blog, "A Few Thoughts on Cryptographic Engineering". In September 2013 a blog post by Green summarizing and speculating on NSA's programs to weaken cryptography, titled "On the NSA", was controversially taken down by Green's academic dean at Johns Hopkins for "contain[ing] a link or links to classified material and also [using] the NSA logo".[5] As Ars Technica notes, this was "a strange request on its face", as this use of the NSA logo by Green was not "reasonably calculated to convey the impression that such use is approved, endorsed, or authorized by the National Security Agency", and linking classified information published by news organizations is legally entirely uncontroversial. The university later apologized to Green, and the blog post was restored (sans NSA logo), with a Johns Hopkins spokesman saying that "I'm not saying that there was a great deal of legal analysis done" as explanation for the legally unmotivated takedown.[6]

In addition to general blog posts about NSA, encryption, and security, Green's blog entries on NSA's backdoor in Dual_EC_DRBG, and RSA Security's usage of the backdoored CSPRNG, have been widely cited in the mainstream news media.[7][8][9][10][11]

Work

Green currently holds the position of Assistant Professor at the Johns Hopkins Information Security Institute. He teaches courses pertaining to practical cryptography.

Green is part of the group which developed Zerocoin, an anonymous cryptocurrency.[12][13][14][15][16] Zerocoin is a cryptocurrency proposed as an extension to the Bitcoin protocol that would add anonymity to Bitcoin transactions. Zerocoin provides anonymity by the introduction of a separate zerocoin cryptocurrency that is stored in the Bitcoin block chain. Though originally proposed for use with the Bitcoin network, zerocoin could be integrated into any cryptocurrency. His research team has exposed flaws in more than one third of SSL/TLS encrypted web sites as well as vulnerabilities in encryption technologies, including RSA BSafe, Exxon/Mobil Speedpass, EZpass, and automotive security systems. In 2015, Green was a member of the research team that identified the LOGjam vulnerability in the TLS protocol.

Green started his career in 1999 at AT&T Laboratories in Florham Park, New Jersey. At AT&T Labs he worked on a variety of projects including audio coding/secure content distribution, streaming video and wireless localization services. As a graduate student he co-founded Independent Security Evaluators (ISE) with two fellow students and Avi Rubin in 2005. Green served as CTO of ISE until his departure in 2011.

Green is a member of the technical advisory board for the Linux Foundation Core Infrastructure Initiative, formed to address critical Internet security concerns in the wake of Heartbleed and sits on the technical advisory boards for CipherCloud, Overnest and Mozilla Cybersecurity Delphi. Green co-founded and serves on the Board for Directors of the Open Crypto Audit Project (OCAP), which undertook a security audit of the TrueCrypt software.[17][18]

External links

References

  1. Zerocoin: Anonymous Distributed E-Cash from Bitcoin (PDF). IEEE Computer Society Conference Publishing Services. May 2013. pp. 397–411. doi:10.1109/SP.2013.34. ISSN 1081-6011.
  2. http://zerocash-project.org/media/pdf/zerocash-oakland2014.pdf
  3. http://dualec.org/DualECTLS.pdf
  4. http://www.nytimes.com/2005/01/29/national/29key.html
  5. http://arstechnica.com/security/2013/09/crypto-prof-asked-to-remove-nsa-related-blog-post/
  6. http://arstechnica.com/security/2013/09/university-apologizes-for-censoring-crypto-prof-over-anti-nsa-post/
  7. http://money.cnn.com/video/technology/2013/06/07/t-prism-what-nsa-could-know-about-you.cnnmoney/
  8. http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?pagewanted=all
  9. http://www.newyorker.com/tech/elements/how-the-n-s-a-cracked-the-web
  10. http://www.wired.com/2014/02/gotofail/
  11. http://www.businessweek.com/articles/2014-04-09/why-heartbleed-the-latest-cybersecurity-scare-matters. Green has also written pieces for the New Yorker and Slate.
  12. http://articles.baltimoresun.com/2014-02-01/news/bs-md-hopkins-bitcoin-20140201_1_virtual-currencies-bitcoin-foundation-ross-william-ulbricht
  13. http://www.forbes.com/sites/andygreenberg/2014/01/13/bitcoin-anonymity-upgrade-zerocoin-to-become-its-own-cryptocurrency/
  14. http://bits.blogs.nytimes.com/2013/11/18/researchers-work-to-add-more-anonymity-to-bitcoin/
  15. http://spectrum.ieee.org/computing/networks/whos-who-in-bitcoin-zerocoin-hero-matthew-green/
  16. http://www.forbes.com/sites/andygreenberg/2013/04/12/zerocoin-add-on-for-bitcoin-could-make-it-truly-anonymous-and-untraceable/
  17. "Technical Advisory Board". Open Crypto Audit Project. Retrieved 30 May 2014.
  18. White, Kenneth; Green, Matthew. "Is TrueCrypt Audited Yet?". Retrieved 30 May 2014.
This article is issued from Wikipedia - version of the Friday, April 01, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.