Bruce Schneier
Bruce Schneier (/ˈʃnaɪ.ər/ New York, December 15 January 1963) is a cryptographer, computer security expert and writer. He is the author of several computer security and cryptography books, and is the founder and chief technology officer of Counterpane Internet Security.
Studies
Originally from New York, Schneier currently lives in Minneapolis with his wife Karen Cooper. Schneier has a bachelor's degree in computer science from American University and a bachelor's degree in physical sciences from the University of Rochester and also from Tecsup. Before he worked at the United States Department of Defense and then at Bell Laboratories. Schneier is responsible for famous computer security phrases such as, "security is not a product, it is a process,", and "information security is a matter of people, processes and technology.# 3. 4;. Schneier has also been referred to in the work of famous hacker Kevin Mitnick (aka the Condor) "The Art of Deception" who has used both phrases to emphasize some aspects of information protection, as well as to recognize Schneier's contributions in this field.
Scheneider in his book Beyond Fear: Thinking Senssible About Security in an Uncertain World introduced the concept of security theater to describe security measures intended to give the public an impression of security without actually improving it. real security. This reflection arose as a debate around airport security after the attacks on the twin towers of September 11, 2001.
Cryptography
Schneier has designed and co-designed several cryptographic algorithms:
- Blowfish, symmetrical encryption algorithm per block.
- Twofish, symmetrical encryption algorithm per block. He was a candidate for the Advanced Encryption Standard algorithm (AES).
- MacGuffin, symmetric encryption algorithm per block.
- Yarrow and Fortuna, cryptographic generators of pseudo-random numbers.
- Solitaire, encryption algorithm to be used by people who cannot access computers.
Crypto Opinion
Schneier's book Applied Cryptography is a popular and respected working reference for cryptography. However, Schneier currently denounces the early success of this work, which she criticizes for having a simplistic and mathematical vision of what is inherently a people's problem.
Schneier believes that in Applied Cryptography he took as a premise that technology and correctly implemented algorithms can provide security and privacy, despite the behavior of others. Schneier now argues that incontrovertible mathematical guarantees (such as, regardless of the behavior of others, as long as I follow the protocol, the protocol will guarantee my safety) don't quite serve the purpose. Schneier gives as an example in his book Secrets and Lies, that a business that uses the RSA encryption algorithm to protect its data without considering how the cryptographic keys are managed by its employees on computers 'complex, unstable and buggy', has flaws in the protection of your data. Schneier argues that a current security solution that includes technology must also take into account hardware, software, communication networks and users, among other factors. Schneier describes how to try to implement secure systems today in the book Practical Cryptography, written with Niels Ferguson.
Schneier currently writes Crypto-Gram, an Internet newsletter about computers and security, as well as a security blog. Schneier is frequently consulted by the press on computer science and security issues, pointing out flaws in security and cryptographic implementations, from problems with biometric recognition to the security measures taken after the attacks of September 11, 2001 in the United States.
Curiosities
- Bruce Schneier appears named in the best-seller The code Da Vinci Dan Brown.
- Solitaire, a cryptographic algorithm developed by Schneier, is the algorithm called Pontifex in the novel Criptonomic Neal Stephenson. It was created by Bruce Schneier for this novel and for its application it is only required of a card deck.
- Blowfish, a cryptographic algorithm developed by Schneier, is mentioned in the fourth season of the television series 24.
Publications
- Schneier, Bruce. Applied CryptographyJohn Wiley & Sons, 1994. ISBN 0-471-59756-2
- Schneier, Bruce. Protect Your MacintoshPeachpit Press, 1994. ISBN 1-56609-101-2
- Schneier, Bruce. E-Mail SecurityJohn Wiley & Sons, 1995. ISBN 0-471-05318-X
- Schneier, Bruce. Applied Cryptography, Second Edition, John Wiley & Sons, 1996. ISBN 0-471-11709-9
- Schneier, Bruce; Kelsey, John; Whiting, Doug; Wagner, David; Hall, Chris; Ferguson, Niels. The Twofish Encryption AlgorithmJohn Wiley & Sons, 1996. ISBN 0-471-35381-7
- Schneier, Bruce; Banisar, David. The Electronic Privacy PapersJohn Wiley & Sons, 1997. ISBN 0-471-12297-1
- Schneier, Bruce. Secrets and LiesJohn Wiley & Sons, 2000. ISBN 0-471-25311-1
- Schneier, Bruce. Beyond Fear: Thinking Sensibly about Security in an Uncertain WorldCopernicus Books, 2003. ISBN 0-387-02620-7
- Ferguson, Niels; Schneier, Bruce. Practical CryptographyJohn Wiley & Sons, 2003. ISBN 0-471-22357-3
- Schneier, Bruce. Liars & Outliers, John Wiley & Sons, 2012. ISBN 978-1118143308
- Schneier, Bruce. Data " Goliath Agenda The Hidden Battles to Collect Your Data and Control Your World, W.W. Norton stranger Company 2014 ISBN 978-0393244816
Contenido relacionado
OpenSSH
Vannevar Bush
Niklaus Wirth
Jeff hawkins
History of artificial intelligence