Yiqun Lisa Yin: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m Reverted edits by 185.183.66.67 (talk): addition of unsourced content to a biographical article (HG) (3.4.9)
Tags: Mobile edit Mobile web edit Advanced mobile edit
 
(16 intermediate revisions by 14 users not shown)
Line 1: Line 1:
{{short description|Chinese-American mathematician}}
'''Yiqun Lisa Yin''' is a Chinese-American cryptographer, the chief security officer and chief cryptographer of [[Symbiont (company)|Symbiont]]. Yin is known for breaking the [[SHA-1]] [[cryptographic hash function]], for developing the [[RC6]] [[block cipher]], and for her service as editor of the [[IEEE P1363]] project for the standardization of [[public-key cryptography]].
'''Yiqun Lisa Yin''' is a Chinese-American cryptographer and independent security consultant. Yin is known for breaking the [[SHA-1]] [[cryptographic hash function]], for developing the [[RC6]] [[block cipher]], and for her service as editor of the [[IEEE P1363]] project for the standardization of [[public-key cryptography]].


==Education and career==
==Education and career==
Yin was a student at [[Peking University]] from 1985 to 1989, and earned a bachelor's degree in applied mathematics there.{{r|bio}} She went to the [[Massachusetts Institute of Technology]] for graduate study, and completed her Ph.D. there in applied mathematics in 1994. Her dissertation, ''Teaching, Learning, and Exploration'', concerned [[computational learning theory]] and [[online algorithm]]s; it was supervised by [[Michael Sipser]].{{r|bio|mg}}
Yin was a student at [[Peking University]] from 1985 to 1989, and earned a bachelor's degree in applied mathematics there.{{r|bio}} She went to the [[Massachusetts Institute of Technology]] for graduate study, and completed her Ph.D. there in applied mathematics in 1994. Her dissertation, ''Teaching, Learning, and Exploration'', concerned [[computational learning theory]] and [[online algorithm]]s; it was supervised by [[Michael Sipser]].{{r|bio|mg}}


She worked as a researcher at [[RSA Security|RSA Laboratories]] from 1994 to 1999, and as directory of security technologies at [[Nippon Telegraph and Telephone|NTT]]'s Palo Alto Laboratory for Multimedia Communications from 1999 to 2002, before becoming an independent consultant. She also worked as a visiting researcher at [[Princeton University]] and [[Tsinghua University]].{{r|bio}}
She worked as a researcher at [[RSA Security|RSA Laboratories]] from 1994 to 1999, and as director of security technologies at [[Nippon Telegraph and Telephone|NTT]]'s Palo Alto Laboratory for Multimedia Communications from 1999 to 2002, before becoming an independent consultant. She also worked as a visiting researcher at [[Princeton University]] and [[Tsinghua University]].{{r|bio}} From 2016 to 2019, Yin was the chief security officer and chief cryptographer of Symbiont.{{r|linkedin}}


==Contributions==
==Contributions==
Yin was the editor of the [[IEEE P1363]] project for the standardization of [[public-key cryptography]].{{r|p1363}} With [[Ron Rivest]], [[Matt Robshaw]], and Ray Sidney, she was one of the designers of [[RC6]], a [[block cipher]] with [[symmetric key]]s that was one of five finalists for the 1997–2000 [[Advanced Encryption Standard process|Advanced Encryption Standard competition]].{{r|aes5}}
Yin was the editor of the [[IEEE P1363]] project for the standardization of [[public-key cryptography]].{{r|p1363}} With [[Ron Rivest]], [[Matt Robshaw]], and Ray Sidney, she was one of the designers of [[RC6]], a [[block cipher]] with [[symmetric key]]s that was one of five finalists for the 1997–2000 [[Advanced Encryption Standard process|Advanced Encryption Standard competition]].{{r|aes5}}


In 2005, with [[Wang Xiaoyun]] and Hongbo Yu, Yin found a [[Collision (computer science)|collision]] (two different data values with the same hash) in the [[SHA-1]] [[cryptographic hash function]], originally designed by the [[National Security Agency]].{{r|break}}
In 2005, with [[Wang Xiaoyun]] and Hongbo Yu, Yin demonstrated an unexpected high probability of [[hash collision|collisions]] (two different data values with the same hash) in the [[SHA-1]] [[cryptographic hash function]], originally designed by the [[National Security Agency]].{{r|break}}
Their work caused SHA-1 to be considered as broken, and it has since fallen out of use.{{r|val}}
Their work caused SHA-1 to be considered as broken, and it has since fallen out of use.{{r|val}}


Line 17: Line 18:
<ref name=aes5>{{citation|contribution-url=https://www.schneier.com/academic/paperfiles/paper-aes-comparison.pdf|contribution=A performance comparison of the five AES finalists|title=AES Candidate Conference|year=2000|first1=Bruce|last1=Schneier|first2=Doug|last2=Whiting}}</ref>
<ref name=aes5>{{citation|contribution-url=https://www.schneier.com/academic/paperfiles/paper-aes-comparison.pdf|contribution=A performance comparison of the five AES finalists|title=AES Candidate Conference|year=2000|first1=Bruce|last1=Schneier|first2=Doug|last2=Whiting}}</ref>


<ref name=bio>{{citation|url=http://people.csail.mit.edu/yiqun/bio.htm|title=Biography|accessdate=2019-10-03|first=Lisa|last=Yin}}</ref>
<ref name=bio>{{citation|url=http://people.csail.mit.edu/yiqun/bio.htm|title=Biography|access-date=2019-10-03|first=Lisa|last=Yin}}</ref>


<ref name=break>{{citation|url=https://www.theregister.co.uk/2005/02/17/sha1_hashing_broken/|title=Crypto researchers break SHA-1|first=Thomas C.|last=Greene|date=February 17, 2005|newspaper=The Register}}</ref>
<ref name=break>{{citation|url=https://www.theregister.co.uk/2005/02/17/sha1_hashing_broken/|title=Crypto researchers break SHA-1|first=Thomas C.|last=Greene|date=February 17, 2005|newspaper=The Register}}</ref>
Line 26: Line 27:


<ref name=val>{{citation|url=https://www.theregister.co.uk/2016/11/21/microsoft_to_massacre_sha1/|title=Microsoft plans St Valentine's Day massacre for SHA‑1: End of the line for weak hash as web giants finally act|first=Iain|last=Thomson|date=November 21, 2016|newspaper=The Register}}</ref>
<ref name=val>{{citation|url=https://www.theregister.co.uk/2016/11/21/microsoft_to_massacre_sha1/|title=Microsoft plans St Valentine's Day massacre for SHA‑1: End of the line for weak hash as web giants finally act|first=Iain|last=Thomson|date=November 21, 2016|newspaper=The Register}}</ref>

<ref name=linkedin>{{citation|url=https://www.linkedin.com/in/lisayin/|title=Lisa Yin on LinkedIn}}</ref>


}}
}}
Line 45: Line 48:
[[Category:Chinese cryptographers]]
[[Category:Chinese cryptographers]]
[[Category:Peking University alumni]]
[[Category:Peking University alumni]]
[[Category:20th-century American women]]
[[Category:21st-century American women]]
[[Category:American women cryptographers]]

Latest revision as of 08:28, 1 April 2024

Yiqun Lisa Yin is a Chinese-American cryptographer and independent security consultant. Yin is known for breaking the SHA-1 cryptographic hash function, for developing the RC6 block cipher, and for her service as editor of the IEEE P1363 project for the standardization of public-key cryptography.

Education and career[edit]

Yin was a student at Peking University from 1985 to 1989, and earned a bachelor's degree in applied mathematics there.[1] She went to the Massachusetts Institute of Technology for graduate study, and completed her Ph.D. there in applied mathematics in 1994. Her dissertation, Teaching, Learning, and Exploration, concerned computational learning theory and online algorithms; it was supervised by Michael Sipser.[1][2]

She worked as a researcher at RSA Laboratories from 1994 to 1999, and as director of security technologies at NTT's Palo Alto Laboratory for Multimedia Communications from 1999 to 2002, before becoming an independent consultant. She also worked as a visiting researcher at Princeton University and Tsinghua University.[1] From 2016 to 2019, Yin was the chief security officer and chief cryptographer of Symbiont.[3]

Contributions[edit]

Yin was the editor of the IEEE P1363 project for the standardization of public-key cryptography.[4] With Ron Rivest, Matt Robshaw, and Ray Sidney, she was one of the designers of RC6, a block cipher with symmetric keys that was one of five finalists for the 1997–2000 Advanced Encryption Standard competition.[5]

In 2005, with Wang Xiaoyun and Hongbo Yu, Yin demonstrated an unexpected high probability of collisions (two different data values with the same hash) in the SHA-1 cryptographic hash function, originally designed by the National Security Agency.[6] Their work caused SHA-1 to be considered as broken, and it has since fallen out of use.[7]

References[edit]

  1. ^ a b c Yin, Lisa, Biography, retrieved 2019-10-03
  2. ^ Yiqun Lisa Yin at the Mathematics Genealogy Project
  3. ^ Lisa Yin on LinkedIn
  4. ^ Kaliski, Burt (July 1997), IEEE P1363: A Comprehensive Standard for Public-Key Cryptography (PDF). See "Officers", p. 37.
  5. ^ Schneier, Bruce; Whiting, Doug (2000), "A performance comparison of the five AES finalists" (PDF), AES Candidate Conference
  6. ^ Greene, Thomas C. (February 17, 2005), "Crypto researchers break SHA-1", The Register
  7. ^ Thomson, Iain (November 21, 2016), "Microsoft plans St Valentine's Day massacre for SHA‑1: End of the line for weak hash as web giants finally act", The Register

External links[edit]