Template:Short description Template:Redirect Template:Use mdy dates Template:Use American English Template:Infobox scientist
Ronald Linn Rivest (Template:IPAc-en;<ref>Archived at GhostarchiveTemplate:Cbignore and the Wayback MachineTemplate:Cbignore: {{#invoke:citation/CS1|citation |CitationClass=web }}Template:Cbignore</ref><ref>Archived at GhostarchiveTemplate:Cbignore and the Wayback MachineTemplate:Cbignore: {{#invoke:citation/CS1|citation |CitationClass=web }}Template:Cbignore</ref> born May 6, 1947) is an American cryptographer and computer scientist whose work has spanned the fields of algorithms and combinatorics, cryptography, machine learning, and election integrity. He is an Institute Professor at the Massachusetts Institute of Technology (MIT),<ref>Template:Cite news</ref> and a member of MIT's Department of Electrical Engineering and Computer Science and its Computer Science and Artificial Intelligence Laboratory.
Along with Adi Shamir and Len Adleman, Rivest is one of the inventors of the RSA algorithm. He is also the inventor of the symmetric key encryption algorithms RC2, RC4, and RC5, and co-inventor of RC6. (RC stands for "Rivest Cipher".) He also devised the MD2, MD4, MD5 and MD6 cryptographic hash functions.
EducationEdit
Rivest earned a bachelor's degree in mathematics from Yale University in 1969, and a Ph.D. degree in computer science from Stanford University in 1974 for research supervised by Robert W. Floyd.<ref name=mathgene>Template:MathGenealogy</ref>
CareerEdit
At MIT, Rivest is a member of the Theory of Computation Group, and founder of MIT CSAIL's Cryptography and Information Security Group.
Rivest was a founder of RSA Data Security (now merged with Security Dynamics to form RSA Security), Verisign, and of Peppercoin.
His former doctoral students include Avrim Blum, Benny Chor, Sally Goldman, Burt Kaliski, Anna Lysyanskaya, Ron Pinter, Robert Schapire, Alan Sherman,<ref name=mathgene/> and Mona Singh.<ref name=monaphd/>
ResearchEdit
Rivest is especially known for his research in cryptography. He has also made significant contributions to algorithm design, to the computational complexity of machine learning, and to election security.
CryptographyEdit
The publication of the RSA cryptosystem by Rivest, Adi Shamir, and Leonard Adleman in 1978Template:Ran revolutionized modern cryptography by providing the first usable and publicly described method for public-key cryptography. The three authors won the 2002 Turing Award, the top award in computer science, for this work. The award cited "their ingenious contribution to making public-key cryptography useful in practice".<ref name=turing>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref> The same paper that introduced this cryptosystem also introduced Alice and Bob, the fictional heroes of many subsequent cryptographic protocols.<ref>Template:Cite journal</ref> In the same year, Rivest, Adleman, and Michael Dertouzos first formulated homomorphic encryption and its applications in secure cloud computing,Template:Ran an idea that would not come to fruition until over 40 years later when secure homomorphic encryption algorithms were finally developed.<ref>Template:Cite book See especially p. 47: "The concept of FHE was introduced by Rivest under the name privacy homomorphisms. The problem of constructing a scheme with these properties remained unsolved until 2009, when Gentry presented his breakthrough result."</ref>
Rivest was one of the inventors of the GMR public signature scheme, published with Shafi Goldwasser and Silvio Micali in 1988,Template:Ran<ref>Template:Cite book</ref> and of ring signatures, an anonymized form of group signatures invented with Shamir and Yael Tauman Kalai in 2001.Template:Ran He designed the MD4 and MD5 cryptographic hash functions, published in 1990 and 1992 respectively,Template:RanTemplate:Ran and a sequence of symmetric key block ciphers that include RC2, RC4, RC5, and RC6.Template:RanTemplate:Ran
Other contributions of Rivest to cryptography include chaffing and winnowing, the interlock protocol for authenticating anonymous key-exchange, cryptographic time capsules such as LCS35 based on anticipated improvements to computation speed through Moore's law, key whitening and its application through the xor–encrypt–xor key mode in extending the Data Encryption Standard to DES-X, and the Peppercoin system for cryptographic micropayments.
AlgorithmsEdit
In 1973, Rivest and his coauthors published the first selection algorithm that achieved linear time without using randomization.Template:Ran<ref>Template:Cite conference</ref> Their algorithm, the median of medians method, is commonly taught in algorithms courses.<ref>Template:Cite journal</ref> Rivest is also one of the two namesakes of the Floyd–Rivest algorithm, a randomized selection algorithm that achieves a near-optimal number of comparisons.Template:Ran<ref>Template:Cite journal</ref>
Rivest's 1974 doctoral dissertation concerned the use of hash tables to quickly match partial words in documents; he later published this work as a journal paper.Template:Ran His research from this time on self-organizing listsTemplate:Ran became one of the important precursors to the development of competitive analysis for online algorithms.<ref>Template:Cite journal</ref> In the early 1980s, he also published well-cited research on two-dimensional bin packing problems,Template:Ran and on channel routing in VLSI design.Template:Ran
He is a co-author of Introduction to Algorithms (also known as CLRS), a standard textbook on algorithms, with Thomas H. Cormen, Charles E. Leiserson and Clifford Stein. First published in 1990, it has extended into four editions, the latest in 2022.Template:Ran
LearningEdit
In the problem of decision tree learning, Rivest and Laurent Hyafil proved that it is NP-complete to find a decision tree that identifies each of a collection of objects through binary-valued questions (as in the parlor game of twenty questions) and that minimizes the expected number of questions that will be asked.Template:Ran With Avrim Blum, Rivest also showed that even for very simple neural networks it can be NP-complete to train the network by finding weights that allow it to solve a given classification task correctly.Template:Ran Despite these negative results, he also found methods for efficiently inferring decision lists,Template:Ran decision trees,Template:Ran and finite automata.Template:Ran
ElectionsEdit
A significant topic in Rivest's more recent research has been election security, based on the principle of software independence: that the security of elections should be founded on physical records, so that hidden changes to software used in voting systems cannot result in undetectable changes to election outcomes. His research in this area includes improving the robustness of mix networks in this application,Template:Ran the 2006 invention of the ThreeBallot paper ballot based end-to-end auditable voting system (which he released into public domain in the interest of promoting democracy),Template:Ran<ref name=turing/> and the development of the Scantegrity security system for optical scan voting systems.Template:Ran
He was a member of the Election Assistance Commission's Technical Guidelines Development Committee.<ref name="NIST">{{#invoke:citation/CS1|citation |CitationClass=web }}</ref>
Honors and awardsEdit
Rivest is a member of the National Academy of Engineering, the National Academy of Sciences, and is a Fellow of the Association for Computing Machinery, the International Association for Cryptologic Research, and the American Academy of Arts and Sciences. Together with Adi Shamir and Len Adleman, he has been awarded the 2000 IEEE Koji Kobayashi Computers and Communications Award and the Secure Computing Lifetime Achievement Award. He also shared with them the Turing Award. Rivest has received an honorary degree (the "laurea honoris causa") from the Sapienza University of Rome.<ref name="bio">Biography. Archived from the original on 2011-12-06.</ref> In 2005, he received the MITX Lifetime Achievement Award. Rivest was named in 2007 the Marconi Fellow, and on May 29, 2008, he also gave the Chesley lecture at Carleton College. He was named an Institute Professor at MIT in June 2015.<ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref>
Selected publicationsEdit
Rivest's publications include:
AlgorithmsEdit
CryptographyEdit
LearningEdit
Elections and votingEdit
Personal lifeEdit
His son is Chris Rivest, entrepreneur and company co-founder.<ref>Cf. Acknowledgements, p.xxi, in Cormen, Rivest, et al., Introduction to Algorithms, MIT Press</ref>
ReferencesEdit
External linksEdit
- List of Ron Rivest's patents on IPEXL
- Home page of Ronald L. Rivest
- Official site of RSA Security Inc.
- Ron Rivest election research papers
- Template:Google scholar id
Template:Kanellakis Award laureates Template:Turing award Template:Authority control