Howard Schmidt had a long career in a variety of fields including government, business, law
enforcement, and of course, cybersecurity. Two of his largest contributions to cybersecurity include
partnering with Tom Ridge to create a cybersecurity consulting company aptly titled Ridge Schmidt
Cyber LLC and serving as the Cyber-Security Coordinator for the Obama Administration.
Schmidt attended the University of Phoenix where he obtained his BS in business administration and
his Masters in Organizational Management. After graduating, he served three terms in the United
States Air Force. After leaving active duty, he worked in civil services. In the 80’s, he
transitioned to a city police officer. After serving as an officer, he climbed the ladder to serve
in SWAT, and eventually took a role within the FBI’s National Drug Intelligence Center.
His career in cybersecurity began when he moved to the Air Force Office of Special Investigations.
There, he established the first computer forensics lab in government. After 30 years of public service,
George W. Bush appointed Schmidt as the Vice Chair of the President's Critical Infrastructure
Protection Board and as the special adviser for cyberspace security for the White House.
This was directly following 9/11. While in that position, he was a leader in developing the U.S.
National Strategy to Secure CyberSpace. Schmidt also served under President Obama as the White House
Cybersecurity Coordinator and held many cyber leadership roles for Ebay. Howard passed away in 2017
due to brain cancer.
Sheila Brand is a cybersecurity pioneer known for her work in the private sector and in government
computer security. She graduated from the Indiana University, Bloomington with a BA in mathematics.
Brand was the defining person behind the production of the Trusted Computer System Evaluation Criteria,
known as the “Orange Book”, a standard set of requirements for assessing and effecting cybersecurity
controls that are standard in a computer system. Following that she contributed to related standards,
known as the “Rainbow Series” which together formed the basis for the internationally accepted Common
Criteria which followed in 1998 and remain in use today.
Sheila worked to integrate theory, policy, and practice in the name of making computers stable and safe
for the average consumer. Brand started her career as a young mathematician at Martin Marietta.
She was the first woman allowed to travel for the company, and underwent intentional efforts to
sabotage her programs by other male employees.
Her skill at seeing these attacks opened a road for
her to accept a leadership position as technical chief at HHS. She eventually worked her way up to
the role of chief of the standards division at NSA’s National Computer Security Center (NCSC).
Kenneth Minihan is a former United States Air Force officer known for his service as the Director of
the NSA, and prior to that, the Director of the Defense Intelligence Agency under the Clinton
administration.
Minihan was born in Pampa, Texas. He attended Florida State University where he obtained his BA in
Political Science. He additionally got a Master’s degree from the Naval Postgraduate School. During his
time under the NSA, he was the essential person in defining and implementing the National Information
Assurance Program, a program that provided adequate IT cybersecurity evaluation and validation
services both within government and industry.
In that regard, he operationalized NSA’s Information
Systems Security mission promoting engagement with industry and academia and U.S. allies.
Kenneth was an intelligence officer who worked in leadership positions as commander at assignments in
the U.S., Europe and Viet Nam. After retiring from the NSA, Minihan served as president of the
Security Affairs Support Association. He currently works as a Managing Director in the Paladin
Capital Group, developing and implementing new investment opportunities for their Homeland Security
Fund and in support of cybersecurity startups.
Minihan has received multiple awards for his service in the military, including the National Security
Medal, the Defense Distinguished Service Medal, The Bronze Star, and the National Intelligence
Distinguished Service Medal.
Virgil D. Gligor is a Romanian Born professor in the Department of Electrical and Computer Engineering
at Carnegie Mellon University.
He specializes in researching applied cryptography, distributed Systems, and cybersecurity. Other
subjects that he worked on include covert channel analysis, access control mechanisms, intrusion
detection, and DoS Protection. Gligor received all his degrees, BS, MS, and PHD, at The University of
California Berkeley.
Virgil taught at the University of Maryland from 1976 to 2007. In 2008, he left UM to teach at
Carnegie Mellon University. During his time there, he became co-Director of CMU’s CyLab. Gligor has
received many accolades and honors for his work in cryptography and security. In 2011, the
Association for Computing Machinery awarded him with the Outstanding Innovation Award. Virgil also
received the 2006 National Information Systems Security Award from the United States National
Security Agency. Additionally, he has been recognized by the IEEE Computer Society for his cryptography
work.
Gligor is a pioneer of computer security and has dedicated four decades of his life to
exploring cryptography and addressing issues within the cyber world, such as next generation security
and trustworthy computing in the face of malware.
Rebecca “Becky” Bace was an American cybersecurity expert and a true pioneer in the field of intrusion
detection. She was born in Leeds, Alabama, a rural area. As a child, she was diagnosed with epilepsy.
During her high school years, she obtained scholarships from Betty Crocker and Jimmy Hoffa, allowing
her to be accepted into the University of Alabama in 1973. During her time there she was the only
woman majoring in the field of Engineering.
Bace flourish in her role as a cybersecurity solutions focused engineer despite her having to overcome
racism and sexism in the field. Her legacy has solidified her as one of the most influential women
in cybersecurity and was one of pioneers of intrusion detection in cybersecurity’s early stages.
In her 16-year career with the NSA, she created the Computer Misuse and Anomaly Detection (CMAD)
research program. She is notable for playing an important role in the apprehension of hacker
Kevin Mitnick. She spent the latter part of her career helping guide startups as a venture
capitalist and maintaining her role as CEO of the Network security consultancy Infidel.
She was known by her peers as the “den mother of computer security” and was a large influence on the
Silicon Valley investment boom regarding cybersecurity services and products. Other accomplishments
include authoring a book titled Intrusion Detection and providing seed money that enabled UC Davis and
Purdue University to kick start computer security labs.
Brian Snow had an astounding 35 years of employment at the NSA, serving as Technical Director of the
Information Assurance Directorate for 6 of those years. He was known for spotting vulnerabilities in
security architecture and worked to create solutions that strengthened security.
Recognizing the need to modernize the Agency’s cryptographic program, Brian led the NSA review of AES.
This allowed NSA to build on standards-based solutions and gave confidence to NSA collaborators around
open, transparent processes for cryptographic capabilities.
After graduating from the University of Colorado, Boulder, Snow started his career as a math
professor at Ohio University. There he laid the groundwork for Ohio University’s first computer
science program. He started his work with NSA in 1971 working with cryptography and system security.
He helped create the Secure Systems Design division and had a large role in the development of
military tactical radios. During his career, he strongly supported the transition from RSA to
Elliptic Curve Cryptography as the main public key in cryptography.
Snow is retired from the NSA, but before retiring in 2006, he assumed a leadership role in the
development of an ethics code for intelligence officers. Snow was a leader in bridging the gap
between the government’s cryptographic dominance and the emerging external/commercial cryptographic
community. In so doing, he created transparency, trust, and confidence.
Corey Schou is a University Professor, Associate Dean, published author, and the director of the
National Information Assurance Training and Education Center. He spent ten years serving as the chair
of the Colloquium for Information Systems Security Education, a forum he also helped start. During
his time serving as chair, Schou worked to help create an open dialogue between leaders in government,
workers in the security industry, and top academic minds to advocate the need for and utilization of
information security and information assurance education.
Schou attended Rollins College where he obtained is BS in Bio-Chemistry. He eventually attained his
PHD in International Law at Florida State University.
Schou’s bread and butter is management information and training systems. During his career, he has
worked with a large variety of organizations including General Motors, Microsoft, and Federal
Express, helping these companies develop their information security.
He also collaborated with others to establish a body of knowledge for computer security. The city of
San Francisco later recognized his work with their organizations. In addition he has received various
awards including the 1997 TechLearn Award and the 2001 (ISC)2 Tipton Award. He has written on these
subjects frequently, with more than 300 books, papers, and articles under his belt. Some of his
most well-known books include Information Assurance Handbook: Effective Computer Security and Risk
Management Strategies and Principles of Computer Security CompTIA Security+ and Beyond Lab Manual.
Most importantly, he led the development of the college curricula which underpins the Centers of
Academic Excellence in Information Systems Security (Cybersecurity) programs at more than 250
colleges and universities in the U.S.
NOTE: There were no Classes of 2017 and 2018 since the program was undergoing internal restructuring.
Horst Feistel is one of the most important figures of modern cryptography. The ubiquitous DES cipher
was primarily his invention, and the techniques he developed are still used in most modern block
ciphers. Feistel was born in Berlin, Germany in 1915, and immigrated to the United States in 1934.
Here, he earned a Bachelor's degree from MIT, and a Master's from Harvard, both in Physics. Despite
this, his true calling was cryptography. Unfortunately, his German background aroused suspicion.
He worked on crypto systems for the U.S. Air Force and MITRE Corp, both of whom were pressured to halt
his research. Eventually, he was able to find a research position at IBM's Thomas J. Watson Laboratory.
It was at IBM where Feistel developed the Lucifer cipher, in the early 1970s. The Lucifer algorithm
he developed takes 64 bits of text and 64 bits of key material and produces 64 bits of cipher text.
The cipher text and the key can be used to recover plaintext, making it a symmetric cipher.
The specific method he used to scramble the data became known as a Feistel Network. Lucifer was
widely considered to be one of the most secure crypto systems of its time. After a few tweaks
mandated by the NSA, such as scaling back the key size to 56 bits, Lucifer was chosen as Data
Encryption Standard (DES) for the United States. Feistel died in 1990.
Professor Hoffman developed the nation’s first regularly offered university course on computer security
and is the author or editor of five books that captured the state of cybersecurity and privacy at
various times between 1973 and 1995. His 1999 study of encryption products explored the effect of
the United States export control regime that he later presented before Congress.
His research has spanned multiple aspects of cybersecurity including cryptography policy, risk
analysis, and statistical inference for data mining. His thought leadership included pioneering
workshops on Internet voting, cybersecurity educational competitions, and workforce development;
the institutionalizing of the ACM Conference on Computers, Freedom, and Privacy; and the development
of courses that focused on e-commerce security, information policy, and cybersecurity and governance
as the field broadened.
He initiated and still leads a CyberCorps scholarship program that has produced dozens of cybersecurity
experts with degrees in at least ten majors who have gone on to work for dozens of different
government agencies. Some later started their own cybersecurity companies.
Upon graduation from MIT, Paul A. Karger was commissioned in the U.S.
Air Force. His Multics security work included a classic 1974 paper on
penetration testing. He taught at the U.S. Air Force Academy before
joining Digital Equipment Corporation, where he worked on multilevel
secure systems.
He was able to transform requirements and formalisms into designs
and implementations. Paul was the lead designer of the VAX VMM
security kernel, which was successfully evaluated at TCSEC Class A1.
This was a remarkable accomplishment: a product from a major
corporation able to enforce mandatory access control policies with
high assurance. Paul earned a Ph.D. from the University of Cambridge.
He was security architect for the Open Software Foundation. He
worked on telephone security at GTE Laboratories. Finally, on the
staff of the Thomas J. Watson Research Center, Paul was a founding
member of IBM's ethical hacking consulting service. He continued to
design commercial systems including a high assurance smart card
operating system.
Paul was always generous with his time and encyclopedic knowledge
of secure systems. His enthusiasm for high assurance development
was contagious. Insight, clear thinking, and communication skills
allowed him to be a leader in shaping our notions regarding highly
trustworthy systems. He never tired of providing examples where
security thinking during system design could make a difference. His
1995 paper on privacy threats to intelligent transport systems was
a harbinger of dangers ahead if security for GPS and mobile devices
was ignored.
Prior to his untimely death, Paul was the inventor or
co-inventor on 14 U.S. patents and 19 non-U.S. patents. He wrote
or co-authored more than 90 technical papers, greatly influencing
the evolution of high assurance technology.
Butler Lampson is a Technical Fellow at Microsoft Corporation and an Adjunct Professor of Computer
Science and Electrical Engineering at MIT. He was on the faculty at Berkeley and then at the Computer
Science Laboratory at Xerox PARC and at Digital's Systems Research Center. He has worked on computer
architecture, local area networks, raster printers, page description languages, operating systems,
remote procedure call, programming languages and their semantics, programming in the large,
fault-tolerant computing, transaction processing, computer security, WHSIWYG editors, and tablet
computers. He was one of the designers of the SDS 940 time-sharing system, the Alto personal
distributed computing system, the Xerox 9700 laser printer, two-phase commit protocols, the Autonet
LAN, the SDSI/SPKI system for network security, the Microsoft Tablet PC software, the Microsoft
Palladium high-assurance stack, and several programming languages.
He received an AB from Harvard University, a PhD in EECS from the University of California at
Berkeley, and honorary ScD's from the Eidgenössische Technische Hochschule, Zurich and the
University of Bologna. He holds a number of patents on networks, security, raster printing, and
transaction processing. He is a member of the National Academy of Sciences and the National Academy
of Engineering and a Fellow of the Association for Computing Machinery and the American Academy of
Arts and Sciences. He received the ACM Software Systems Award in 1984 for his work on the Alto, the
IEEE Computer Pioneer award in 1996, the National Computer Systems Security Award in 1998, the IEEE
von Neumann Medal in 2001, the Turing Award in 1992, and the National Academy of Engineering's Draper
Prize in 2004.
At Microsoft he has worked on anti-piracy, security, fault-tolerance, and user interfaces. He was one
of the designers of Palladium, and spent two years as an architect in the Tablet PC group. Currently
he is in Microsoft Research, working on security, privacy, and fault-tolerance, and kibitzing in
systems, networking, and other areas.
With a major in Mathematics, Len got his start in computers with IBM in the Time Life building in
NYC in 1960. He continued in this new field as an Army Lieutenant with the Army Security Agency
Training Center and School at Fort Devens, Massachusetts from 1961 to 1963. There he worked with an
IBM 650 (1000 words of main memory!) and taught Fortran programming. After over 40 years with The
MITRE Corporation where he worked on numerous federal government contracts, Len retired in 2013.
His principal efforts with MITRE supported various initiatives to improve computer and network
security, ending with a project on cyber resiliency. In 1973, he co-authored with David Bell a
pioneering paper on computer security, which came to be known as the “Bell-LaPadula Model”.
This mathematical model became part of the computer science curriculum in many universities,
influenced developments in computer systems, and contributed to the “Orange Book” series published
by the National Security Agency. As a retiree, he enjoys quiet gardening.
William Hugh Murray began his security career at IBM in the late 1960s when he managed the development
of the user access control subsystems for IBM’s ground breaking Advanced Administrative System (AAS),
a model for later systems. In 1976 he authored the IBM publication Data Security Controls and
Procedures which remained in publication into the 90s. These two works began a career providing
security leadership, innovation, guidance, and support to government, business, and academia and
their requirements to IBM research and product development.
He is a founder of the Colloquium for Information System Security Education (CISSE). He led the
ISSA committee that expressed the professional common body of knowledge which was used to develop
the examination for certifying information security professionals and the (ISC)2 committee that
wrote the professional code of conduct and ethical guidance. He served for more than a decade on
the Board of (ISC)2 seeing it from a volunteer effort to a self-supporting enterprise serving more
than a hundred thousand professionals.
Dan Geer has ten years in clinical and research medical computing followed
by five years running MIT’s Project Athena. After a small stint in the Research
Division of the then Digital Equipment Corporation, he became involved in a
series of start-up endeavors, in all cases either as a founder outright or an
officer of the company.
Mr. Geer now finds himself in government service as the
CISO at In-Q-Tel, the investment arm of the U.S. Intelligence community. He is a
frequent author, six times entrepreneur, and has spoken five times before
Congress on cybersecurity initiatives.
Cynthia E. Irvine is a Distinguished Professor of Computer Science at the Naval Postgraduate School.
Her research has focused on developmental security as applied to the creation of trustworthy systems,
and more recently, on cyber operations. She is a champion of cyber security instruction designed to
ensure that the foundational concepts of constructive cyber security are integrated into academic
courses and curricula.
Through curriculum development, educational tools, the supervision of student research, and her
professional activities, Dr. Irvine is a true leader in cyber security education.
Jerome H. Saltzer has been a faculty member at MIT since 1966, where his teaching and research interests
have been about principles of computer system engineering. His involvement in cyber security began
with the discovery in 1964 that it was surprisingly easy to break into the MIT Compatible Time-Sharing
System.
He helped design the security aspects of the Multics time-sharing system and he led the development
of a security kernel for Multics; later he led the development of the Kerberos single-login
authentication system. His paper with Michael D. Schroeder "The Protection of Information in Computer
Systems" collected a set of security principles that have been widely cited for four decades.
Ron Ross is considered the “Father” of the Federal Information Security Management Act (FISMA)
security standards and recognized as one of the world’s leading experts on cyber security.
He is the principal architect of the NIST Risk Management Framework and led the development of the
first set of unified cyber security standards for the federal government, including the Department of
Defense and the Intelligence Community.
Dr. Ross has received the NSA Scientific Achievement Award, Defense Superior
Service Medal, Department of Commerce Gold and Silver Medals, and three Federal 100 Awards.
He has been inducted into the Information Systems Security Association (ISSA) Hall of Fame and is an
ISSA Distinguished Fellow.
Steven B. Lipner is recently retired as the Partner Director of Software Security in Trustworthy
Computing Security at Microsoft and serves as a board member and chair of SAFECode.
He led Microsoft’s Security Development Lifecycle team and was responsible for its corporate strategies
and policies for supply chain security and for strategies related to government security
evaluation of Microsoft products.
He is named as an inventor on 12 U.S. patents with two pending
applications in the field of computer and network security, and is co-author of the book,
The Security Development Lifecycle.
Susan Landau has been a twenty-year leader in the "Crypto Wars." Her books, Privacy on the Line:
The Politics of Wiretapping and Encryption, co-authored with Whitfield Diffie, and Surveillance or
Security? The Risks Posed by New Wiretapping Technologies, testimony in Congress, and technical and
policy research have helped ensure the widespread availability of strong encryption.
Landau has been a long-term advocate for NIST's Computer Security Lab, including during her tenure
on the Information Security and Privacy Advisory Board. She is a strong advocate for women in computer
science, and has organized workshops for women students and young faculty. Landau is Professor of
Cybersecurity Policy at Worcester Polytechnic Institute, and has previously been a Senior Staff
Privacy Analyst at Google and a Distinguished Engineer at Sun Microsystems.
Paul Kocher designed the cryptographic elements of SSL3 back in the mid-1990s,
while still an undergraduate at Stanford, thereby gaining him an international reputation for allowing
secure Internet transactions.
The longevity of SSL3 is a testament to his brilliance, as is the fact that he is entirely
self-taught in cryptography.
Vinton G. Cerf is vice president and Chief Internet Evangelist for Google. He contributes to
global policy development and continued spread of the Internet.
Widely known as one of the "Fathers of the Internet," Cerf is the co-designer of the
TCP/IP protocols and the architecture of the Internet.
Philip R. Zimmermann is the creator of Pretty Good Privacy (PGP), the most widely used email
encryption software in the world. He is also known for his work in VOIP encryption protocols,
notably ZRTP and Zfone.
Steven M. Bellovin is a professor of computer science at Columbia University, where he does research
on networks, security, and especially why the two don't get along, as well as related public policy
issues.
Bellovin is the co-author of Firewalls and Internet Security: Repelling the Wily Hacker, and holds a
number of patents on cryptographic and network protocols.
Richard Alan Clarke is the former National Coordinator for Security, Infrastructure Protection,
and Counter-terrorism for the United States. Under President George W. Bush, he served as the
Special Advisor to the President on cyber security.
Mr. Clarke developed and found sponsorship for legislation which created the Cyber Corps and lead
the development of the first National Plan for Cyber Security.
Dr. Bell was the co-author of the Bell-LaPadula model of computer security (with Leonard J. LaPadula).
The model became the most widely used security model in the development of trusted (secure) computer systems.
His two papers “Lattices, Policies and Implementations” and “Putting Policy Commonalities
to Work” showed not only that any Boolean policy could be supported by any Boolean-policy implementation,
but also that every “different” security policy in the literature was a Boolean security policy, and
hence supportable by any Boolean implementation.
He served as CEO of RSA Data Security from 1986 through 1999. Along with RSA co-founder and MIT professor
Ron Rivest, Bidzos built RSA into the premier cryptography company in the 80s and 90s.
Bidzos formed Verisign in 1995 to provide trusted certificate authority services to a global market
after pioneering the concept within RSA beginning in 1986.He also created the RSA Conference in 1991,
and was the Chairman of the event until his retirement from that position in 2004.
Eugene H. Spafford is one of the most recognized leaders in the field of computing.
Dr. Eugene Spafford is a professor with an appointment in Computer Science at Purdue University,
where he has been a member of the faculty since 1987.
He is a senior advisor and consultant on issues of security
and intelligence, education, and policy to a number of major companies, academic and government agencies,
including Microsoft, Intel, Unisys, the US Air Force, the NSA, the GAO, the FBI, the NSF, the DoJ, the DoE,
and two Presidents of the United States.
The late James Anderson effectively started the field of intrusion detection, invented the
concept of the reference monitor, made some very significant but classified contributions to
counterintelligence, and organized some of the first cyber penetration teams, including a well-known
group at CIA named "The Brain Trust".
Mr. Anderson originated the idea of contaminated media and loading an altered OS, the "2 card loader"
issue, whose intellectual successor is such things as Stuxnet, APTs, and arguably was the first computer
virus. In 1990, Mr. Anderson was one of the first recipients of the National Computer Systems Security Award.
The late Willis H. Ware (Ph.D., Princeton University, 1951) was a senior computer scientist emeritus with
the RAND Corporation. An electrical engineer, he devoted his career to hardware, software, architectures,
software development, networks, federal agency and military applications, management of
computer-intensive projects, public policy and legislation.
Dr. Ware was a member of the NAE, a Fellow of the IEEE, AAAS,and ACM.
He received the U.S. Air Force Exceptional Civilian Service Medal (1979), the IEEE Centennial Medal (1984),
the National Computer System Security Award (1989), and the IEEE Computer Pioneer Award (1993).
F. Lynn McNulty, an early champion of information security in the government, passed away on June 4.
McNulty, whom Federal Computer Week identified as one of the key thought leaders of the past 25 years in a
feature package that will appear in the June 15 issue, spent 30 years in the government.
Over the span of his federal career he served as the State Department’s first director of information
systems security; as security program manager at the Federal Aviation Administration; and as associate
director for computer security at the National Institute of Standards and Technology.
Professor Hellman is best known for his invention, with Diffie and Merkle,
of public key cryptography.
In addition to many other uses, this technology forms the basis for secure transactions on the Internet.
He has also been a long-time contributor to the computer privacy debate, starting with the issue of DES
key size in 1975 and culminating with service (1994-96) on the National Research Council's Committee to
Study National Cryptographic Policy, whose main recommendations have since been implemented.
Merkle developed the world's earliest public key cryptographic system. Their insight underpins secure
transactions on the Internet, enabling e-commerce and a host of other interactions in which secure electronic
communications are required.
Since 1988, Merkle has been researching nanotechnology and, in 2003, became a distinguished professor at
Georgia Tech before returning to California in 2006.He has been awarded the RSA Award in Mathematics (2000)
and the IEEE Richard W. Hamming Medal (2010).
Diffie and Hellman worked together throughout 1975 and were joined by Ralph Merkle in 1976.
The results of their work appeared in Diffie and Hellman's paper, New Directions in Cryptography,
in November 1976. The insights in this paper underpin secure transactions on the Internet,
enabling e-commerce and a host of other interactions in which secure electronic communications are required.
In 1992, Diffie was awarded an honorary doctorate by the Swiss Federal Institute of Technology in Zurich, and
in 2010, shared the IEEE Richard W. Hamming Medal with Ralph Merkle and Martin Hellman.
She is currently a Distinguished Professor in the Department of Defense Analysis at the Naval Postgraduate
Schoolin
Monterey, CA, and is one of the faculty associated with the Center on Terrorism and Irregular Warfare
and with the Center for Information Systems Security Studies and Research.
Dr. Denning has published 150 articles and four books, her most recent being Information Warfare and Security.
She has been named to the ISSA Hall of Fame (2003), awarded the CSO COMPASS award (2003),
named as both a CISSP and as a CISM honoris causa, and elected as a Fellow of the ACM (1995).
Dr. Schell was co-founder and Vice President for Engineering of Gemini Computers, Inc.,
where he directed development of Gemini's Class A1 network processor commercial product.
He was also the founding Deputy Director of the (now) National Computer Security Center.
Previously he was an Associate Professor of Computer Science at the Naval Postgraduate School.
He has been referred to as the "father" of the Trusted Computer System Evaluation Criteria (the "Orange Book").
The NIST and NSA have recognized Dr. Schell with the National Computer System Security Award.
In the Computer Science Laboratory at SRI he led the Provably Secure Operating System (PSOS) project,
under which the SRI Hierarchical Development Methodology (HDM) was created.
Dr. Neumann’s main research interests continue to involve security, crypto applications, overall system
survivability, reliability, fault tolerance, safety, software-engineering methodology, systems in the large,
applications of formal methods, and risk avoidance. He has written numerous papers, given many talks,
and has provided testimony before government hearings. He recently published a book Computer Related Risks
(ACM Press, 1995).
Dr. Landwehr is a noted expert in trustworthy computing, including high assurance software development,
understanding software flaws and vulnerabilities, token-based authentication, system evaluation and
certification methods, multilevel security, and architectures for intrusion tolerant systems
He has been a leader in cybersecurity research, having led cybersecurity programs at the National Science
Foundation from 2001-2004 and 2009-2011, overseeing the disbursement of more than $110M of grants,
and having served as a division chief at IARPA from 2005-2009.
He is the Andrew and Erna Viterbi Professor of Computer Science at MIT's Department of Electrical Engineering
and Computer Science (EECS) and a member of MIT's Computer Science and Artificial Intelligence Laboratory
(CSAIL)
Rivest is a member of the National Academy of Engineering, the National Academy of Sciences,
and is a Fellow of the Association for Computing Machinery, the International Association for
Cryptologic Research, and the American Academy of Arts and Sciences
. He is a co-inventor of the RSA algorithm (with Ron Rivest and Len Adleman),
a co-inventor of the Feige–Fiat–Shamir identification scheme (with Uriel Feige and Amos Fiat),
one of the inventors of differential cryptanalysis and has made numerous contributions to the fields
of cryptography and computer science
In addition to RSA, Shamir's other numerous inventions and contributions to cryptography include the
Shamir secret sharing scheme, the breaking of the Merkle-Hellman knapsack cryptosystem, visual cryptography,
and the TWIRL and TWINKLE factoring devices.
Shamir has also made contributions to computer science outside of cryptography, such as finding the first
linear time algorithm for 2-satisfiability and showing the equivalence of the complexity classes PSPACE and IP.
He is known for being a co-inventor of the RSA (Rivest-Shamir-Adleman) cryptosystem in 1977, and of DNA
computing. RSA is in widespread use in security applications, including https.
For his contribution to the invention of the RSA cryptosystem, Adleman, along with Ron Rivest and Adi Shamir,
has been a recipient of the 1996 Paris Kanellakis Theory and Practice Award and the 2002 ACM Turing Award,
often called the Nobel Prize of Computer Science. He is one of the original discoverers of the
Adleman-Pomerance-Rumely primality test. Fred Cohen, in his 1984 paper, Experiments with Computer Viruses has
credited Adleman with coining the term "virus".