The+SHA-3+Competition+and+the+Skein+Hash+Algorithm

From: gc@cecs.pdx.edu Subject: [CS-Colloq] CS Colloquium: Monday Nov. 28th Date: 2011 November 23 11:04:46 AM PST

Monday, Nov. 28th. 10:15-11:45am, FAB 86-01

Speaker: Jesse Walker, Intel

Title: The SHA-3 Competition and the Skein Hash Algorithm

Abstract: The talk begins by reviewing the most important properties of cryptographic hash function and how they have been built in the past. It then outlines major events around NIST's SHA-3 competition to design a new hash function standard and gives an overview of the competition status. The talk concludes by describing Skein, one of the competition finalist algorithms.

Bio: Jesse Walker is a researcher in Intel Corporation's Security Research Lab. His interests include networking and security, and he reviews the use of cryptography in all Intel products. He was the architect for the Ivy Bridge random number generator in the next generation of Intel processors, and designed Intel's direct anonymous attestation protocol. He is one of the designers of the Skein hash algorithm, a finalist in NIST's SHA-3 competition. In October 2000 he presented the first paper identifying flaws in WEP, the original Wi-Fi encryption protocol, and was the architect for the 802.11i standard, WEP's replacement. In 2005 the Wi-Fi Alliance and Intel Corporation both honored him for opening China's market to Wi-Fi, where it had been blocked by China's encryption regulations. He wrote the first commercial IPsec implementation in 1995 for Raptor Systems, and created the architecture the IETF adopted for DHCP. Dr. Walker received a Ph.D. in mathematics from the University of Texas in 1980. -- Sara Smith Graduate Coordinator Computer Science Portland State University (503) 725-3218 gc@cs.pdx.edu _______________________________________________ CS-Colloq mailing list CS-Colloq@cecs.pdx.edu https://mailhost.cecs.pdx.edu/cgi-bin/mailman/listinfo/cs-colloq