Robert Morris (cryptographer)

From Vero - Wikipedia
Jump to navigation Jump to search

Template:Short description Template:Infobox scientist

Robert Morris (July 25, 1932 – June 26, 2011) was an American cryptographer and computer scientist.<ref name=NYTobit>Template:Cite news</ref><ref>Template:Cite conference</ref> His name sometimes appears with a middle initial H that he adopted informally.

Family and education

Morris was born in Boston, Massachusetts. His parents were Walter W. Morris, a salesman, and Helen Kelly Morris, a homemaker.<ref name=NYTobit/> He received a bachelor's degree in mathematics from Harvard University in 1957 and a master's degree in applied mathematics from Harvard in 1958.

He married Anne Farlow, and they had three children together: Robert Tappan Morris (author of the 1988 Morris worm),<ref name=usvmorris505>Template:Cite court</ref> Meredith Morris, and Benjamin Morris.<ref>Robert Morris obituary, The Washington Post, June 30, 2011.</ref>

Bell Labs

From 1960 until 1986, Morris was a researcher at Bell Labs and worked on Multics and later Unix.

Using the TMG compiler-compiler, Morris, together with Doug McIlroy, developed the early implementation of the PL/I compiler called EPL for the Multics project.<ref>Template:Cite web</ref><ref>Template:Cite web</ref> The pair also contributed a version of runoff text-formatting program for Multics.<ref>Template:Cite FTP</ref>

Morris's contributions to early versions of Unix include the math library, the dc programming language, the program crypt, and the password encryption scheme used for user authentication.<ref name="reader">Template:Cite tech report</ref><ref>Dabbling in the Cryptographic World--A Story, Dennis Ritchie, May 5, 2000, Bell Labs. Archived.</ref> The encryption scheme (invented by Roger Needham), was based on using a trapdoor function (now called a key derivation function) to compute hashes of user passwords which were stored in the file /etc/passwd; analogous techniques, relying on different functions, are still in use today.<ref>Password Security: A Case History by Robert Morris and Ken Thompson (1978)</ref>

National Security Agency

In 1986, Morris began work at the National Security Agency (NSA).<ref name=NYTobit/> He served as chief scientist of the NSA's National Computer Security Center, where he was involved in the production of the Rainbow Series of computer security standards, and retired from the NSA in 1994.<ref>The data encryption standard—Retrospective and prospects, R. Morris, IEEE Communications 16, #6 (November 1978), pp. 11–14.</ref><ref>IEEE Electronic CIPHER 9 (1995-09-18)</ref><ref>AUUG 98 Conference Information and Registration Form, accessed on line November 29, 2007.</ref> He once told a reporter that, while at the NSA, he helped the FBI decode encrypted evidence.<ref name=NYTobit/>

There is a description of Morris in Clifford Stoll's book The Cuckoo's Egg. Many readers of Stoll's book remember Morris for giving Stoll a challenging mathematical puzzle (originally due to John H. Conway) in the course of their discussions on computer security: What is the next number in the sequence 1 11 21 1211 111221? (known as the look-and-say sequence). Stoll was unaware of the answer to this puzzle at the time and remained unaware when writing The Cuckoo's Egg and thus did not reveal the answer in his book.<ref>Template:Cite web</ref>

Robert Morris died in Lebanon, New Hampshire.

Quotes

Template:Copy to Wikiquote

  • Rule 1 of cryptanalysis: check for plaintext.<ref name="Crypto95">Template:Cite web</ref>
  • Never underestimate the attention, risk, money, and time that an opponent will put into reading traffic.<ref name="Crypto95" />
  • It is easy to run a secure computer system. You merely have to disconnect all dial-up connections and permit only direct-wired terminals, put the machine and its terminals in a shielded room, and post a guard at the door.<ref>Template:Cite journal</ref>

Selected publications

  • (with Fred T. Grampp) UNIX Operating System Security, AT&T Bell Laboratories Technical Journal, 63, part 2, #8 (October 1984), pp. 1649–1672.

References

Template:Reflist

Template:Multics

Template:Authority control