Justin Troutman Blog

Last Updated on 6 Dec. 2006, Total: 10 Blog Posts

Justin Troutman is an independent contract cryptographer and cryptanalyst, based in the general Charlotte-Gastonia-Salisbury metropolitan area of North Carolina's southern Piedmont region, who sports a forte consisting of a specialization in the structural design semantics of cryptographic primitives and their mathematical cryptanalyses, on which he has authored publications and lectured abroad. His prominent areas of interest are the design strategies, and cryptanalysis, of block ciphers (i.e., wide-trail, in particular), MAC functions, and cryptovirological protocols and their game theoretical implications, using both symmetric and asymmetric primitives as components.

On a contract basis, his array of engagements include consulting, conceptualizing, constructing, and cryptanalyzing tactful cryptographic protocols and their respective algorithmic components, as well as authoring publications on cryptanalysis, and conservative policies for implementing cryptography. On an academic basis, he is pursuing doctorate-level research in the pure mathematical corpus of cryptology.

He can be contacted at justin at justintroutman dot org, for general inquiries, speaking engagements, or consulting (cryptanalytical evaluation at the systematic and primitive levels). His weblog, curriculum vitae, publications, and other miscellany, can be found at his autobiographical site: http://www.justintrout....

10 Weekly Permutation
  1. "I'll have the pancakes, please." I'll need to see some I.D. first.

    The last place I expected to see a security issue was IHOP. Sure enough, though, this very thing happened in Quincy, Massachusetts. Here's the skinny. You walk into IHOP and ask to be seated, only to have a security guard ask to hold your I.D. What? This reminds me of the problem with drivers pulling out of gas stations without... Read More

  2. The Hunt For Hash September.

    Immediately following this years CRYPTO conference in Santa Barbara, NIST held The Second Cryptographic Hash Workshop. From that link, you can access the papers and presentations from the workshop. This, as some of you might know, is the think-tank for ideas that may eventually result in a new hash function standard. For now, the SHA-256 is a good interim standard,... Read More

  3. Honeyota - if Winnie was a car thief.

    Minneapolis has this so-called "bait-car" program. Simply put, the police use nice rides as decoys to lure in car thieves. Concepts like this are certainly not new, but hey, it's something I just read in the "news" and my first thought was that it's analogous to honeypots, in some regards. The article opens up with the mention of a Toyota... Read More

  4. DataDot - protect your goods (or own someone else's!)

    Okay, so this isn't new, but I've been wanting to point out what I feel is an obvious security failure. Essentially, these "DataDots" are laser-etched dots, granular in size, much like sand. They're prepared in a UV-based adhesive for application. The dots contain a unique identifier code, that upon application, will allow your property to be identified as belonging to... Read More

  5. Danged if you disclose; danged if you don't.

    In this article at The Register, a point is raised; is it even worth disclosing vulnerabilities, considering the ramifications? In the cryptographic community, disclosure is mortar; it is responsible for the stability of research in the field. Good, secure cryptographic design is a product of the cryptanalytical aptitude that was built before it. Simply put, this means that cryptography, in... Read More

  6. Shifting problems, rather than solving them.

    I happened to be browsing CNN and noticed a story entitled, "Cameras that scold." The short description read: "Residents and police say talking surveillance cameras reduce crime. CNN's Gary Nurenberg reports ( April 8 )" Basically, the city of Baltimore has, at residents' requests, installed surveillance cameras that are activated by motion detection sensors. Upon activation, it alerts: "Your photograph... Read More

  7. Questions for the Audience: Current Cryptographic Concerns

    This question is aimed at both developers and consumers. The role I fulfil is strictly cryptanalytical; that is, when I work on a project, I conceptualize what the security infrastructure should look like, from a cryptographic standpoint, but the developers ultimately implement this conceptualization of mine. Oftentimes, when I'm brought onto the project, there is already an infrastructure in place,... Read More

  8. A new blog about matters cryptographic, and some other things.

    Well folks, I have finally hopped on the blog bandwagon, which I am excited about. I have a personal weblog at http://www.justintroutman.org/blog/, but it's reserved for intense cryptanalytical miscellany only, such as the latest cryptanalysis from around the community, and my own research. Here, I'll discuss a variety of issues - some more cryptographic than others. Oh, and I cordially... Read More

  9. About

    This is an example of a WordPress page, you could edit this to put information about yourself or your site so readers know where you are coming from. You can create as many pages like this one or sub-pages as you like and manage all of your content inside of WordPress... Read More

  10. [STICKY] Weekly Permutation: News and information on happenings within the cryptographic community

    The Weekly Permutation's focus shifts from happenings in the cryptographic community, to general computer security, to the politics that affect it all. Cryptographic coverage includes everything from the latest cryptanalysis of block ciphers and hash functions to the use of cryptography in a malicious context, such as cryptoviral information extortion. In regards to general computer security and the politics surrounding... Read More