MIT crypto pioneers scoop Turing Award

Nobel Prize of computing goes to Goldwasser and Micali

Beginner's guide to SSL certificates

Two professors from MIT have won the Turing Award for their pioneering cryptography work.

Shafi Goldwasser, the RSA Professor of Electrical Engineering and Computer Science at MIT and a professor at Israel's Weizmann Institute of Science, and Silvio Micali, the MIT Ford Professor of Engineering, secured the award for "transformative work that laid the complexity-theoretic foundations for the science of cryptography, and in the process pioneered new methods for efficient verification of mathematical proofs in complexity theory," as a citation for the 2012 ACM A.M. Turing Award explains.

A statement by the Association for Computing Machinery (ACM) adds:

By formalizing the concept that cryptographic security had to be computational rather than absolute, they created mathematical structures that turned cryptography from an art into a science.

Their work addresses important practical problems such as the protection of data from being viewed or modified, providing a secure means of communications and transactions over the internet. Their advances led to the notion of interactive and probabilistic proofs and had a profound impact on computational complexity, an area that focuses on classifying computational problems according to their inherent difficulty.

The pair are responsible for zero-knowledge proof systems, which allow one party to prove the validity of a statement to a second party without revealing any information beyond the validity of the statement. This means that the second party could not go on to prove the validity of a statement to a third party.

Goldwasser and Micali laid the groundwork for technologies such as SSL encryption and digital signatures, according to ACM President Vint Cerf, who won the award himself in 2004.

“The encryption schemes running in today’s browsers meet their notions of security," Cerf said. "The method of encrypting credit card numbers when shopping on the internet also meets their test. We are indebted to these recipients for their innovative approaches to ensuring security in the digital age.”

Limor Fix, director of the University Collaborative Research Group at Intel Labs, added:

The work of Goldwasser and Micali has expanded the cryptography field beyond confidentiality concerns.

Their innovations also led to techniques for message integrity checking and sender/receiver identity authentication as well as digital signatures used for software distribution, financial transactions, and other cases where it is important to detect forgery or tampering. They have added immeasurably to our ability to conduct communication and commerce over the internet.

Goldwasser and Micali were joint authors of an influential paper, Probabilistic Encryption as graduate students in 1983. Their definition of the security of encryption as a “game” involving adversaries has become a trademark of modern cryptography. An adversary (third party) should not be able to gain even partial information about a cryptographic secret, they argued.

The two cryptographers will split a $250,000 prize that accompanies the award, which is due to be presented by the Association for Computing Machinery on 15 June in San Francisco. The prize in sponsored by Intel and Google.

A full list of Turing Award winners can be found here. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story


Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.