Roger Needham, 1935-2003

نویسنده

  • Mahadev Satyanarayanan
چکیده

Cambridge Research Lab, which he founded in 1997. Prior to joining Microsoft, he was associated with Cambridge University for nearly half a century—as an undergraduate and graduate student, as a researcher, and eventually as a professor and head of the Computer Laboratory. In this EIC message, I focus on the significance of Needham's research contributions to pervasive computing. These contributions are foundational in character. We are so dependent on them that we hardly realize that they each required a leap of imagination and creativity to bring into existence. In that respect, they meet Mark Weiser's criterion for a profound technology: they " weave themselves into the fabric of everyday lives until they are indistinguishable from it. " Every time you authenticate yourself to a remote system, you probably use a derivative of a technique that Needham and his colleague Michael Schroeder originally developed. In the mid 1970s, they were both involved in Xerox PARC's pioneering effort to create a personal computing environment. Part of that vision included using shared resources, such as laser printers and file servers, from many different clients over a network. The need to control access to these resources led naturally to the need for user authentication. Needham and Schroeder formulated the authentication problem in a fundamentally different way from its prior formulation in the context of time-sharing systems. Not only did a computer system have to be assured of the user's identity, but the reverse also had to be true: the human user had to be confident that he or she was not interacting with a compromised remote computer. In other words, the problem was one of mutual authentication between untrusted parties. What made the problem especially challenging was the assumption that the network was completely open. Malicious third-party machines could eavesdrop on all communication between the parties desiring mutual authentication. A malicious machine could also inject communication into the network, letting it masquerade as one of the parties. It could do this, for example, by replaying communication that it had recorded earlier during a genuine authentication. Needham and Schroeder's approach combined several simple ideas into an elegant whole. First, it used end-to-end encryption to convert an open network into a secure communication channel. Second, it inferred the possession of a shared secret (the keys used for encryp-tion and decryption) from the ability to generate a correctly encrypted response to a challenge. Third, it foiled replay …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Capsule Reviews Representation of Web Data in a Web Warehouse

When, last summer, a meeting of editorial board members of The Computer Journal was proposed for January 2003, one of those planning to attend was Roger Needham. His participation was not to be. Following a struggle with cancer, Roger Needham passed away on 28 February 2003. Roger was one of les grands of computer science. His work ranged over an incredibly wide swathe of computer science. His ...

متن کامل

Xlviii. Competition between Phos- Phorylating Enzymes in Muscle Extract by Hermann Lehmann and Dorothy

The second reaction has been very carefully investigated, and it was shown that an equilibrium occurs [Lehmann, 1935; 1936]. The equilibrium point depends on pH. It was further found that the reaction is not trimolecular. It can be split up into two bimolecular reactions in which adenosinediphosphate (a substance discovered by Lohmann [1935] in crab muscle) figures in vertebrate muscle also, as...

متن کامل

Access Control 4.1 Introduction

Going all the way back to early time-sharing systems we systems people regarded the users, and any code they wrote, as the mortal enemies of us and each other. We were like the police force in a violent slum. — Roger Needham Microsoft could have incorporated effective security measures as standard, but good sense prevailed. Security systems have a nasty habit of backfiring and there is no doubt...

متن کامل

Cryptanalysis of XXTEA

XXTEA, or Corrected Block TEA, is a simple block cipher in Roger Needham and David Wheeler’s TEA series of algorithms. We describe a chosen plaintext attack for XXTEA using about 259 queries and negligible work.

متن کامل

Network Aware Applications: A Background Transfer Service

Network aware applications react to changing network conditions, offering potential quality of service differentiation without network support. We describe an application level approach to designing a low priority service — one that is ‘lower than best-effort’ in the context of the Internet. Such applications are appropriate for background file transfers, such as OS updates. We use a receive wi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Pervasive Computing

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2003