Matthew Daniel Green | |
---|---|
Born | Hanover, New Hampshire, United States |
Residence | Baltimore, Maryland, United States |
Citizenship | American |
Fields |
Computer Science Cryptography |
Institutions | Johns Hopkins University |
Alma mater |
Johns Hopkins University Oberlin College |
Known for | Zerocoin, Zerocash, TrueCrypt Audit |
Matthew Daniel Green (born 1976) is a cryptographer and security technologist. Green is an Assistant Professor of Computer Science at the Johns Hopkins Information Security Institute. He specializes in applied cryptography, privacy-enhanced information storage systems, anonymous , elliptic curve crypto-systems, and satellite television piracy. He is a member of the teams that developed the Zerocoin anonymous and Zerocash. He has been involved in the groups that exposed vulnerabilities in RSA BSAFE,Speedpass and E-ZPass.
Green received a B.S. from Oberlin College (Computer Science), a B.M. from Oberlin College (Electronic Music), a Masters from Johns Hopkins University (Computer Science), and a PhD from Johns Hopkins University (Computer Science). His dissertation was titled Cryptography for Secure and Private Databases: Enabling Practical Data Access without Compromising Privacy.
Green is the author of the blog, "A Few Thoughts on Cryptographic Engineering". In September 2013 a blog post by Green summarizing and speculating on NSA's programs to weaken cryptography, titled "On the NSA", was controversially taken down by Green's academic dean at Johns Hopkins for "contain[ing] a link or links to classified material and also [using] the NSA logo". As Ars Technica notes, this was "a strange request on its face", as this use of the NSA logo by Green was not "reasonably calculated to convey the impression that such use is approved, endorsed, or authorized by the National Security Agency", and linking classified information published by news organizations is legally entirely uncontroversial. The university later apologized to Green, and the blog post was restored (sans NSA logo), with a Johns Hopkins spokesman saying that "I'm not saying that there was a great deal of legal analysis done" as explanation for the legally unmotivated takedown.
In addition to general blog posts about NSA, encryption, and security, Green's blog entries on NSA's backdoor in Dual_EC_DRBG, and RSA Security's usage of the backdoored Cryptographically secure pseudorandom number generator (CSPRNG), have been widely cited in the mainstream news media.