Bruce Schneier

format_list_bulleted Contenido keyboard_arrow_down
ImprimirCitar

Bruce Schneier (/ˈʃnaɪ.ər/ New York, December 15 January 1963) is a cryptographer, computer security expert and writer. He is the author of several computer security and cryptography books, and is the founder and chief technology officer of Counterpane Internet Security.

Studies

Originally from New York, Schneier currently lives in Minneapolis with his wife Karen Cooper. Schneier has a bachelor's degree in computer science from American University and a bachelor's degree in physical sciences from the University of Rochester and also from Tecsup. Before he worked at the United States Department of Defense and then at Bell Laboratories. Schneier is responsible for famous computer security phrases such as, "security is not a product, it is a process,", and "information security is a matter of people, processes and technology.# 3. 4;. Schneier has also been referred to in the work of famous hacker Kevin Mitnick (aka the Condor) "The Art of Deception" who has used both phrases to emphasize some aspects of information protection, as well as to recognize Schneier's contributions in this field.

Scheneider in his book Beyond Fear: Thinking Senssible About Security in an Uncertain World introduced the concept of security theater to describe security measures intended to give the public an impression of security without actually improving it. real security. This reflection arose as a debate around airport security after the attacks on the twin towers of September 11, 2001.

Cryptography

Schneier has designed and co-designed several cryptographic algorithms:

  • Blowfish, symmetrical encryption algorithm per block.
  • Twofish, symmetrical encryption algorithm per block. He was a candidate for the Advanced Encryption Standard algorithm (AES).
  • MacGuffin, symmetric encryption algorithm per block.
  • Yarrow and Fortuna, cryptographic generators of pseudo-random numbers.
  • Solitaire, encryption algorithm to be used by people who cannot access computers.

Crypto Opinion

Schneier's book Applied Cryptography is a popular and respected working reference for cryptography. However, Schneier currently denounces the early success of this work, which she criticizes for having a simplistic and mathematical vision of what is inherently a people's problem.

Schneier believes that in Applied Cryptography he took as a premise that technology and correctly implemented algorithms can provide security and privacy, despite the behavior of others. Schneier now argues that incontrovertible mathematical guarantees (such as, regardless of the behavior of others, as long as I follow the protocol, the protocol will guarantee my safety) don't quite serve the purpose. Schneier gives as an example in his book Secrets and Lies, that a business that uses the RSA encryption algorithm to protect its data without considering how the cryptographic keys are managed by its employees on computers 'complex, unstable and buggy', has flaws in the protection of your data. Schneier argues that a current security solution that includes technology must also take into account hardware, software, communication networks and users, among other factors. Schneier describes how to try to implement secure systems today in the book Practical Cryptography, written with Niels Ferguson.

Schneier currently writes Crypto-Gram, an Internet newsletter about computers and security, as well as a security blog. Schneier is frequently consulted by the press on computer science and security issues, pointing out flaws in security and cryptographic implementations, from problems with biometric recognition to the security measures taken after the attacks of September 11, 2001 in the United States.

Curiosities

  • Bruce Schneier appears named in the best-seller The code Da Vinci Dan Brown.
  • Solitaire, a cryptographic algorithm developed by Schneier, is the algorithm called Pontifex in the novel Criptonomic Neal Stephenson. It was created by Bruce Schneier for this novel and for its application it is only required of a card deck.
  • Blowfish, a cryptographic algorithm developed by Schneier, is mentioned in the fourth season of the television series 24.

Publications

  • Schneier, Bruce. Applied CryptographyJohn Wiley & Sons, 1994. ISBN 0-471-59756-2
  • Schneier, Bruce. Protect Your MacintoshPeachpit Press, 1994. ISBN 1-56609-101-2
  • Schneier, Bruce. E-Mail SecurityJohn Wiley & Sons, 1995. ISBN 0-471-05318-X
  • Schneier, Bruce. Applied Cryptography, Second Edition, John Wiley & Sons, 1996. ISBN 0-471-11709-9
  • Schneier, Bruce; Kelsey, John; Whiting, Doug; Wagner, David; Hall, Chris; Ferguson, Niels. The Twofish Encryption AlgorithmJohn Wiley & Sons, 1996. ISBN 0-471-35381-7
  • Schneier, Bruce; Banisar, David. The Electronic Privacy PapersJohn Wiley & Sons, 1997. ISBN 0-471-12297-1
  • Schneier, Bruce. Secrets and LiesJohn Wiley & Sons, 2000. ISBN 0-471-25311-1
  • Schneier, Bruce. Beyond Fear: Thinking Sensibly about Security in an Uncertain WorldCopernicus Books, 2003. ISBN 0-387-02620-7
  • Ferguson, Niels; Schneier, Bruce. Practical CryptographyJohn Wiley & Sons, 2003. ISBN 0-471-22357-3
  • Schneier, Bruce. Liars & Outliers, John Wiley & Sons, 2012. ISBN 978-1118143308
  • Schneier, Bruce. Data " Goliath Agenda The Hidden Battles to Collect Your Data and Control Your World, W.W. Norton stranger Company 2014 ISBN 978-0393244816

Contenido relacionado

OpenSSH

OpenSSH is a set of applications that allow encrypted communications over a network, using the SSH protocol. It was created as a free and open alternative to...

Vannevar Bush

Vannevar Bush was an American engineer and scientist. He is known for the political role he played in the development of the atomic bomb and for his idea...

Niklaus Wirth

Niklaus Wirth computer...

Jeff hawkins

Jeff Hawkins is a computer engineer, inventor of the Palm Pilot and the Treo smartphone, founder of the Palm and Handspring companies. He has also worked in...

History of artificial intelligence

The [Paleolithic] emerged definitively from some works published in the 1940s that did not have a great impact, but from the influential work in 1950 by Alan...
Más resultados...
Tamaño del texto:
undoredo
format_boldformat_italicformat_underlinedstrikethrough_ssuperscriptsubscriptlink
save