• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer
  • Home
  • Subscribe
  • Your Membership
    • Edit Your Profile
  • Services
    • Advertising
    • Case studies
    • Design
    • Email marketing
    • Lead generation
    • Magazine
    • Press releases
    • Publishing
    • Sponsored posts
    • Webcasting
    • Webinars
    • White papers
    • Writing
  • Shop
    • My Account
    • Cart
  • About
    • Contact
    • Privacy
    • Terms of use
  • Events

Robotics & Automation News

Market trends and business perspectives

  • News
  • Features
  • Video
  • Webinars
  • White papers
  • Press releases
  • Featured companies
    • BlueBotics
    • SICK Sensor Intelligence
    • Vicor Power
Stanford's Martin Hellman, left, and Whitfield Diffie, shown in 1977

Stanford cryptography pioneers Whitfield Diffie and Martin Hellman win Turing Award

March 2, 2016 by Abdul Montaqim

Stanford's Martin Hellman, left, and Whitfield Diffie, shown in 1977
Stanford’s Martin Hellman, left, and Whitfield Diffie, shown in 1977, were awarded the 2015 A.M. Turing Award this week

The groundbreaking algorithm from Whitfield Diffie and Martin Hellman enabled a secure Internet and sparked a clash with the NSA that foreshadowed current privacy battles between government agencies and Silicon Valley companies.

Stanford cyber-security innovators Whitfield Diffie and Martin Hellman, who brought cryptography from the shadowy realm of classified espionage into the public space and created a major breakthrough that enabled modern e-commerce and secure communications over the Internet, are being honored with the Association for Computing Machinery’s 2015 A.M. Turing Award.

The award is often referred to as the “Nobel Prize of computing” and comes with a $1 million prize funded by Google.

The Association for Computing Machinery (ACM) made the official announcement Tuesday morning at the RSA conference in San Francisco – one of the largest gatherings of cryptographers working on Internet security. 

Diffie and Hellman’s 1976 paper, “New Directions in Cryptography,” stunned the academic and intelligence communities by providing a blueprint for a revolutionary new technique that would allow people to communicate over an open channel, with no prearrangement, but keep their information secret from any potential eavesdroppers.

They called it public-key cryptography.

They also showed how, by reversing the order of operations, it was possible to create a “digital signature.” Like a written signature, this has to be easy for the legitimate signer to create and for everyone else to verify. But it has to be difficult – preferably impossible – for anyone else to sign new messages. Unlike a written signature, which looks the same even if it’s taken from a $1 check and forged onto a $1,000,000 check, a digital signature can only be used with the specific message that was signed.

Digital signatures and the “digital certificates” or “certs” they can produce are critical components in the modern security architecture. They allow your browser to know that your bank is really who it claims to be, and they allow iPhones to only run software signed by Apple.

“Their 1976 invention is widely viewed as the birth of modern cryptography,” said Dan Boneh, Stanford professor of computer science and electrical engineering and co-director of the Stanford Cyber Initiative.

“Simply put, without their work, the Internet could not have become what it is today,” Boneh said. “Billions of people all over the planet use the Diffie-Hellman protocol on a daily basis to establish secure connections to their banks, e-commerce sites, e-mail servers, and the cloud.”

Threat of jail time

It was a feat made even more impressive by the fact that little serious academic scholarship on cryptography existed at the time of their invention outside the realm of classified research conducted under the purview of secretive government agencies such as the National Security Agency. Hellman said academic colleagues had tried to discourage him from pursuing his interest in cryptography early in his career because of the NSA’s virtual monopoly on the subject.

“They said, ‘You’re wasting your time working on cryptography because the NSA has such a huge budget and a several-decades head start,” said Hellman, Stanford professor emeritus of electrical engineering. “How are you going to come up with something they don’t already know? And if you come up with something good, they’ll classify it.'”

Diffie and Hellman clashed with the NSA over their publications, including one that claimed that the agency had pressured IBM to weaken the National Bureau of Standards’ Data Encryption Standard (DES) by limiting the key size to 56 bits instead of a stronger option of 64 bits or higher.

After the publication of “New Directions in Cryptography” and another paper on the DES key size, the conflict intensified as the NSA waged a concerted campaign to limit the distribution of Diffie and Hellman’s research.

An NSA employee even sent a letter to the publishers warning that the authors could be subject to prison time for violating U.S. laws restricting export of military weapons.

These skirmishes became known as the first of the “crypto wars.”

Ultimately, the NSA failed to limit the spread of their ideas, and public key cryptography became the backbone of modern Internet security.

“Cryptography is the one indispensable security technique,” said Diffie, who was a part-time researcher at Stanford at the time he and Hellman invented public-key cryptography. “There are lots of other things needed, but if the government had succeeded in blocking people from having strong cryptographic systems … it would have meant you could not have had security on the Internet.”

Cryptography’s starring role

Diffie and Hellman said the U.S. government’s recent demands that Silicon Valley companies build so-called back doors into their products so law enforcement and intelligence agencies could access encrypted messages reminded them of the first crypto war. As then, the government did not have a workable proposal for how to create those back doors without undermining the security of those products.

Diffie and Hellman both said they sided with Apple in the current legal standoff over the FBI’s request that Apple provide access to an iPhone belonging to one of the San Bernardino terrorists by writing software to bypass some of its security features.

“All the computer security experts that I talk with – I don’t think there’s been one who believes that we should do what the government wants,” Hellman said. “While in this one case it might not do much harm, it establishes a dangerous precedent where Apple is then likely to be inundated with thousands upon thousands of requests that they’ll have to either fight or comply with at great risk to the security of the iPhone system.”

Diffie said giving in to the FBI’s request would also make it harder for Apple to resist similar requests from foreign governments who want to spy on their citizens and crush internal dissent.

“We do not wish to support the ability of totalitarian regimes to do this kind of thing when they are persecuting people for their free speech,” Diffie said.

Diffie and Hellman are both currently affiliated with Stanford’s Center for International Security and Cooperation (CISAC), where they regularly attend seminars on a diverse range of national security issues and mentor young pre- and postdoctoral fellows on issues of cyber security.

“What’s great about both Whit Diffie and Marty Hellman is the way in which they contribute to the ongoing intellectual discourse of the Center,” said CISAC co-director David Relman. “Both of them think broadly and deeply far outside the bounds of their formal training and the areas of accomplishment for which they are now being recognized by this prize.”

Persis Drell, dean of Stanford’s School of Engineering, said the award, and the work behind it, exemplified the caliber and tone of research for which the school’s faculty are noted.

“Engineers want to have a positive impact on our world, and we are enormously proud to have Marty Hellman as an emeritus member of the Stanford Engineering faculty,” Drell said.

Boneh, whose main area of research is applied cryptography, said Diffie and Hellman’s work continued to inspire a new generation of cryptographers.

“Beyond the practical implications of the work, their groundbreaking 1976 paper ‘New Directions in Cryptography’ introduced new concepts and opened up new directions that were previously thought to be impossible,” Boneh said.

“It introduced number theory into the realm of cryptography and launched an entire academic discipline to further develop the area of public-key cryptography. By now there are thousands of researchers and tens of thousands of research papers building on their work. The field of cryptography would be a pale image of what it is today without the work of Diffie and Hellman.”

Article by Steve Fyffe and Tom Abate 

Print Friendly, PDF & Email

Share this:

  • Print
  • Facebook
  • LinkedIn
  • Reddit
  • Twitter
  • Tumblr
  • Pinterest
  • Skype
  • WhatsApp
  • Telegram
  • Pocket

You might also like…

Filed Under: Features

Join the Robotics & Automation News community

Primary Sidebar

Latest articles

  • How robots and RPA will change the business of the future
  • The Pros and Cons of Selling vs Trading in Your Vehicle
  • How to Ensure Your Drivers Stay Safe on the Road
  • Reasons Why You Need to Buy a Rotary Fill and Seal Coffee Packaging Machine
  • Fulfyld selects inVia Robotics to automate warehouses
  • DB Schenker to operate zero-emission autonomous ship for Ekornes
  • Southie Autonomy secures $2.5 million seed funding and $5 million in robot lease financing
  • Daimler Truck makes strategic investment in Apex.AI
  • Berkshire Grey launches new mobile robotic platform
  • Clearpath Robotics launches latest version of TurtleBot

Most Read

  • Top 20 electric vehicle charging station companies
    Top 20 electric vehicle charging station companies
  • Track your lost Android
    Track your lost Android
  • Difference Between Three-Phase and Single-Phase Power
    Difference Between Three-Phase and Single-Phase Power
  • Top 20 programmable logic controller manufacturers
    Top 20 programmable logic controller manufacturers
  • Top 25 vertical farming companies
    Top 25 vertical farming companies
  • The Best Mechanical Engineering Design Software in 2022
    The Best Mechanical Engineering Design Software in 2022
  • Top 10 graphics processing unit manufacturers: Nvidia clearly in the lead
    Top 10 graphics processing unit manufacturers: Nvidia clearly in the lead
  • Scientists have found more water in space than they ever knew possible
    Scientists have found more water in space than they ever knew possible
  • What You Need to Know About Fixing an Engine Misfire
    What You Need to Know About Fixing an Engine Misfire
  • How to become a G-Code master with a complete list of G-Codes
    How to become a G-Code master with a complete list of G-Codes

Overused words

abb ai applications automated automation automotive autonomous business china companies company control customers data design development digital electric global industrial industry logistics machine manufacturing market mobile platform process production robot robotic robotics robots safety software solution solutions system systems technologies technology time vehicle vehicles warehouse

Secondary Sidebar

Latest news

  • How robots and RPA will change the business of the future
  • The Pros and Cons of Selling vs Trading in Your Vehicle
  • How to Ensure Your Drivers Stay Safe on the Road
  • Reasons Why You Need to Buy a Rotary Fill and Seal Coffee Packaging Machine
  • Fulfyld selects inVia Robotics to automate warehouses
  • DB Schenker to operate zero-emission autonomous ship for Ekornes
  • Southie Autonomy secures $2.5 million seed funding and $5 million in robot lease financing
  • Daimler Truck makes strategic investment in Apex.AI
  • Berkshire Grey launches new mobile robotic platform
  • Clearpath Robotics launches latest version of TurtleBot

Footer

We are…

Robotics and Automation News was established in May, 2015, and is now one of the most widely-read websites in its category.

Please consider supporting us by becoming a paying subscriber, or through advertising and sponsorships, or by purchasing products and services through our shop – or a combination of all of the above.

Thank you.

Independent

Archivists

March 2016
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
« Feb   Apr »

Complex

Old-skool

This website and its associated magazine, and weekly newsletter, are all produced by a small team of experienced journalists and media professionals.

If you have any suggestions or comments, feel free to contact us at any of the email addresses on our contact page.

We’d be happy to hear from you, and will always reply as soon as possible.

Future-facing

Free, fair and legal

We support the principles of net neutrality and equal opportunities.

Member of The Internet Defense League

Copyright © 2022 · News Pro on Genesis Framework · WordPress · Log in

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT