Search

Niels T Ferguson

age ~59

from Redmond, WA

Also known as:
  • Niels Gerguson
Phone and address:
17420 31St St, Redmond, WA 98052
425 497-9137

Niels Ferguson Phones & Addresses

  • 17420 31St St, Redmond, WA 98052 • 425 497-9137
  • 15623 99Th St, Redmond, WA 98052 • 425 497-9137
  • Kiona, WA
  • 17420 NE 31St Ct, Redmond, WA 98052 • 425 497-9137

Work

  • Company:
    Microsoft
    Mar 2004
  • Position:
    Cryptographer & principal software development engineer

Education

  • School / High School:
    Eindhoven University of Technology
    1984 to 1991
  • Specialities:
    Mathematics

Industries

Computer Software

Wikipedia

Niels Fergus

view source

Niels T. Ferguson (born 10 December 1965, Eindhoven) is a Dutch cryptographer and consultant who currently works for Microsoft. He has worked with others, ...

Us Patents

  • Cipher For Disk Encryption

    view source
  • US Patent:
    7602906, Oct 13, 2009
  • Filed:
    Aug 25, 2005
  • Appl. No.:
    11/211865
  • Inventors:
    Niels Thomas Ferguson - Redmond WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    H04L 9/00
  • US Classification:
    380 29, 380 42
  • Abstract:
    Encryption is provided with additional diffusion components to construct a block cipher with a large and variable block size. The cipher incorporates an encryption system or algorithm such that the cipher is at least as secure as the encryption system or algorithm. Additional components of the cipher provide improved diffusion. This combination ensures that the cipher is at least as strong as the encryption algorithm, and at the same time it provides additional security properties due to its improved diffusion.
  • On-The-Fly Contents-Based Access Control System

    view source
  • US Patent:
    7690045, Mar 30, 2010
  • Filed:
    Sep 15, 2005
  • Appl. No.:
    11/227706
  • Inventors:
    Niels Thomas Ferguson - Redmond WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    G06F 7/04
    H04L 9/00
    G06F 11/30
  • US Classification:
    726 30, 726 27, 726 28, 726 29, 726 16, 726 19, 713187, 713188
  • Abstract:
    An access control system applies contents-based policies to data that is being transferred. This transfer can be between different computers, different operating systems on a single computer, different applications within on the same operating system, or different parts of the same operating system, for example. Data is scanned at a scan engine associated with a security reference monitor (SRM) as the data is being transmitted, on-the-fly. The data is forwarded directly to the recipient, so the data is not stored at the SRM. The data is encrypted at the SRM as it comes by, and the key is revealed to the recipient if it is subsequently determined that the transfer is allowed.
  • Fast Rsa Signature Verification

    view source
  • US Patent:
    7774607, Aug 10, 2010
  • Filed:
    Dec 18, 2006
  • Appl. No.:
    11/640796
  • Inventors:
    Niels Ferguson - Redmond WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    H04L 9/00
  • US Classification:
    713176, 380 28, 380 30
  • Abstract:
    An RSA message signature can be verified by verifying that smod n=F(m, n). If a value K, defined as K=sdiv n is computed in advance and provided as an input to the computing device verifying the signature, the signature verification can be significantly faster. To avoid transmission of, and mathematical operations on, large values of K, which can themselves be inefficient, the RSA public exponent e can be selected to be relatively small, such as e=2 or e=3. K is based on publicly available information and can be calculated by the computing device signing the message, or by an intermediate computing device, and transmitted to the device verifying the signature without impacting security.
  • Unified Authentication For Web Method Platforms

    view source
  • US Patent:
    7992198, Aug 2, 2011
  • Filed:
    Sep 14, 2007
  • Appl. No.:
    11/855364
  • Inventors:
    Brian J. Guarraci - Redmond WA, US
    Christopher C. White - Seattle WA, US
    Niels Thomas Ferguson - Redmond WA, US
    Jeffrey Dick Jones - Woodinville WA, US
    Sean Patrick Nolan - Bellevue WA, US
    Johnson T. Apacible - Mercer Island WA, US
    Vijay Varadan - Bellevue WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    G06F 7/04
    G06F 15/16
    G06F 17/30
    G06F 21/00
    H04L 29/06
    H04L 9/32
    G06F 15/173
  • US Classification:
    726 9, 726 7, 713175, 713176, 713181, 713185
  • Abstract:
    An authentication mechanism is provided for a web method platform that allows homogeneous access for different types of clients according to a bootstrapping procedure utilized to establish the session. Different clients can be assigned different levels of trust based in part on the bootstrapping procedure and/or information provided during the procedure. The bootstrapping procedure can produce a token that is used by the clients in subsequent requests to provide previous authentication or state information to the platform. The token can comprise a shared secret used to ensure integrity of communications in some cases, and the token can be opaque to the client. Tokens can expire and require a client to re-bootstrap to provide higher levels of authentication protection, and tokens can be shared among a plurality of application servers to facilitate effective handling of requests in a farmed environment.
  • Cryptographic Processing

    view source
  • US Patent:
    8036379, Oct 11, 2011
  • Filed:
    Mar 15, 2006
  • Appl. No.:
    11/376454
  • Inventors:
    Niels T. Ferguson - Redmond WA, US
    Peter L. Montgomery - Bellevue WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    H04L 9/00
    H04K 1/00
    H04L 29/02
  • US Classification:
    380 29, 713164, 713193, 380 37, 380277, 726 5, 726 9
  • Abstract:
    Executable instructions designed to provide faster cryptographic processing, fixed-timing memory access, and dedicated memory usage are implementable on an x86 CPU utilizing XMM registers. The instructions can be utilized to implement cryptographic processing in accordance with the Advanced Encryption Standard (AES). To encrypt, a single instruction performs nonlinear transformation, rotation, and linear transformation. Another single instruction used during encryption performs nonlinear transformation and rotation. New instructions also are implemented to perform decryption. The instructions implemented to perform decryption perform the mathematical inverse functions of their counterparts used for encryption.
  • Cipher For Disk Encryption

    view source
  • US Patent:
    8085933, Dec 27, 2011
  • Filed:
    Sep 3, 2009
  • Appl. No.:
    12/553193
  • Inventors:
    Niels Thomas Ferguson - Redmond WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    H04L 9/00
  • US Classification:
    380 29, 380 42
  • Abstract:
    Encryption is provided with additional diffusion components to construct a block cipher with a large and variable block size. The cipher incorporates an encryption system or algorithm such that the cipher is at least as secure as the encryption system or algorithm. Additional components of the cipher provide improved diffusion. This combination ensures that the cipher is at least as strong as the encryption algorithm, and at the same time it provides additional security properties due to its improved diffusion.
  • Managing Group Keys

    view source
  • US Patent:
    8325924, Dec 4, 2012
  • Filed:
    Feb 19, 2009
  • Appl. No.:
    12/389217
  • Inventors:
    Tolga Acar - Sammamish WA, US
    Josh Benaloh - Redmond WA, US
    Niels Thomas Ferguson - Redmond WA, US
    Carl M. Ellison - Medina WA, US
    Mira Belenkiy - Redmond WA, US
    Duy Lan Nguyen - Bellevue WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    H04L 9/00
  • US Classification:
    380277, 380 44
  • Abstract:
    In an example, one or more cryptographic keys may be associated with a group. Any member of the group may use the key to encrypt and decrypt information, thereby allowing members of the group to share encrypted information. Domain controllers (DCs) maintain copies of the group's keys. The DCs may synchronize with each other, so that each DC may have a copy of the group's keys. Keys may have expiration dates, and any client connected to a DC may generate a new key when a key is nearing expiration. The various clients may create new keys at differing amounts of time before expiration on various DCs. DCs that store keys early thus may have time to propagate the newly-created keys through synchronization before other DCs are requested to store keys created by other clients. In this way, the creation of an excessive number of new keys may be avoided.
  • Efficient Distribution Of Computation In Key Agreement

    view source
  • US Patent:
    8331568, Dec 11, 2012
  • Filed:
    May 28, 2009
  • Appl. No.:
    12/474265
  • Inventors:
    Niels Thomas Ferguson - Redmond WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    H04L 9/00
    H04L 9/08
    H04L 9/30
    H04L 9/32
    H04L 29/06
  • US Classification:
    380285, 380 30, 380 44, 380259, 380282, 713151, 713156, 713171, 713175, 713176
  • Abstract:
    In Transport Layer Security (TLS) or other communication protocols, the load on the server may be lowered by reducing the number of expensive decryption operations that the server has to perform. When a client contacts a server, the client sends the server the client's public key. The server chooses a secret value, encrypts the value with the client's public key, and sends the encrypted value to the client. When the client decrypts the secret, the server and client share a secret value, which may be used to derive an encryption key for further messages. In many key agreement schemes, the client chooses and encrypts the secret value, and the server recovers the value with an expensive decryption operation. By instead having the server choose the value and send it to the client, an expensive decryption operation is redistributed from the server to the client, thereby freeing server resources.

Amazon

Cryptography Engineering: Design Principles And Practical Applications

Cryptography Engineering: Design Principles and Practical Applications

view source

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential ...


Author
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno

Binding
Paperback

Pages
384

Publisher
Wiley

ISBN #
0470474246

EAN Code
9780470474242

ISBN #
1

Cryptography Engineering: Design Principles And Practical Applications By Niels Ferguson (Mar 15 2010)

Cryptography Engineering: Design Principles and Practical Applications by Niels Ferguson (Mar 15 2010)

view source

Binding
Paperback

Publisher
Wiley

ISBN #
15

By Niels Ferguson Cryptography Engineering: Design Principles And Practical Applications (1St First Edition) [Paperback]

By Niels Ferguson Cryptography Engineering: Design Principles and Practical Applications (1st First Edition) [Paperback]

view source

Binding
Paperback

Publisher
Wiley

ISBN #
14

By Niels Ferguson Cryptography Engineering: Design Principles And Practical Applications (1St Edition)

By Niels Ferguson Cryptography Engineering: Design Principles and Practical Applications (1st Edition)

view source

Binding
Paperback

Publisher
Wiley

ISBN #
13

Practical Cryptography (Computer Science) By Niels Ferguson (15-Apr-2003) Paperback

Practical Cryptography (Computer Science) by Niels Ferguson (15-Apr-2003) Paperback

view source

Author
Niels Ferguson

Binding
Paperback

Publisher
John Wiley & Sons; 1 edition (15 April 2003)

ISBN #
12

By Niels Ferguson - Cryptography Engineering: Design Principles And Practical Applications (1St Edition) (2/13/10)

By Niels Ferguson - Cryptography Engineering: Design Principles and Practical Applications (1st Edition) (2/13/10)

view source

Author
Niels Ferguson

Binding
Paperback

Publisher
Wiley

EAN Code
8601300284644

ISBN #
11

Practical Cryptography 1St (First) Edition By Ferguson, Niels, Schneier, Bruce Published By Wiley (2003)

Practical Cryptography 1st (first) Edition by Ferguson, Niels, Schneier, Bruce published by Wiley (2003)

view source

Author
Niels, Schneier, Bruce Ferguson

Binding
Paperback

Publisher
Wiley

ISBN #
10

Practical Cryptography 1St (First) Edition By Ferguson, Niels, Schneier, Bruce [2003]

Practical Cryptography 1st (first) Edition by Ferguson, Niels, Schneier, Bruce [2003]

view source

Binding
Paperback

Publisher
Wiley

ISBN #
8

Resumes

Niels Ferguson Photo 1

Cryptographer And Principal Software Development Engineer

view source
Location:
Seattle, WA
Industry:
Computer Software
Work:
Microsoft since Mar 2004
Cryptographer & Principal Software Development Engineer

IACR since 1990
member

IEEE 802.11 TGi Oct 2002 - Apr 2003
Member

MacFergus 2001 - 2003
Director & Cryptographic consultant

Counterpane Internet Security 1997 - 2001
Cryptographic consultant
Education:
Eindhoven University of Technology 1984 - 1991
De Jonge Onderzoekers, Eindhoven 1977 - 1990

Isbn (Books And Publications)

  • Practical Cryptography

    view source
  • Author:
    Niels Ferguson
  • ISBN #:
    0471223573
  • The Twofish Encryption Algorithm: A 128-Bit Block Cipher

    view source
  • Author:
    Niels Ferguson
  • ISBN #:
    0471353817

Wikipedia References

Niels Ferguson Photo 2

Niels Ferguson

About:
Born:

1965

Work:
Position:

Cryptanalyst • Consultant

Education:
Specialty:

Cryptographer

Skills & Activities:
Skill:

Algorithms

Niels Ferguson Photo 3

Niels Ferguson

Youtube

'Much worse than the 1970s': Historian Niall ...

Top historian Niall Ferguson warned Friday that the world is sleepwalk...

  • Duration:
    13m 25s

Niall Ferguson: History of Money, Power, War,...

OUTLINE: 0:00 - Introduction 1:34 - University of Austin (UATX) 34:29 ...

  • Duration:
    2h 41m 14s

The Coming Ukrainian Winter: A conversation w...

The 2023 Kyiv Jewish Forum's special preview panel, featuring one of t...

  • Duration:
    53m 14s

The Hidden Patterns, China's Total Collapse a...

Recorded 12/05/22 Renowned historian Niall Ferguson delves into the co...

  • Duration:
    16m 32s

Niall Fergusons The Square and the Tower

Recorded on November 9, 2017 With social networks like Facebook and Tw...

  • Duration:
    51m 20s

Niall Ferguson: The 6 killer apps of prosperity

Over the past few centuries, Western cultures have been very good at c...

  • Duration:
    20m 20s

News

Researchers Solve Juniper Backdoor Mystery; Signs Point To Nsa

Researchers Solve Juniper Backdoor Mystery; Signs Point to NSA

view source
  • The weaknesses in Dual_EC have been known for at least eight years. In 2007, a Microsoft employee named Dan Shumow gave a five-minute talk at a cryptography conference in California discussing discoveries that he and a Microsoft colleague named Niels Ferguson had made in the algorithm. The algorithm
  • Date: Dec 22, 2015
  • Category: Sci/Tech
  • Source: Google
Rsa Warns Customers Off Suspected Nsa-Tainted Crypto Tools

RSA Warns Customers Off Suspected NSA-Tainted Crypto Tools

view source
  • The problem is that there is a backdoor in the NIST SP800-90 Dual-EC-PRNG standard. This was first discovered by Microsoft researchers Dan Shumow and Niels Ferguson, who discussed their findings at a Crypto 2007 rump session.
  • Date: Sep 21, 2013
  • Category: Sci/Tech
  • Source: Google

Get Report for Niels T Ferguson from Redmond, WA, age ~59
Control profile