Mordechai M. "Moti" Yung is a
cryptographer and
computer scientist
A computer scientist is a scientist who specializes in the academic study of computer science.
Computer scientists typically work on the theoretical side of computation. Although computer scientists can also focus their work and research on ...
known for his work on
cryptovirology and
kleptography.
Career
Yung earned his PhD from
Columbia University
Columbia University in the City of New York, commonly referred to as Columbia University, is a Private university, private Ivy League research university in New York City. Established in 1754 as King's College on the grounds of Trinity Churc ...
in 1988 under the supervision of
Zvi Galil.
In the past, he worked at the
IBM
International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
Thomas J. Watson Research Center,
CertCo,
RSA Laboratories, and
Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
. In 2016, Yung moved from Google to
Snap Inc. Yung is currently a research scientist at Google.
Yung is an adjunct senior research faculty member at Columbia University,
and has co-advised PhD students including
Gödel Prize winner
Matthew K. Franklin,
Jonathan Katz, and
Aggelos Kiayias.
Research
Yung research covers primarily the area of
cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
and its applications to
information security
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
and
data privacy. He has worked on defining and implementing malicious (offensive) cryptography:
cryptovirology and
kleptography,
and on various other foundational and applied fields of cryptographic research, including: user and entity
electronic authentication,
information-theoretic security,
secure multi-party computation,
threshold cryptosystems,
and
zero-knowledge proofs,
Cryptovirology
In 1996, Adam L. Young and Yung coined the term cryptovirology to denote the use of cryptography as an attack weapon via
computer viruses and other
malware in contrast to its traditional protective role.
In particular, they described the first instances of
ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
using public-key cryptography.
Kleptography
In 1996, Adam L. Young and Yung introduced the notion of kleptography
[Infosecurity Magazine: The Dark Side of Cryptography: Kleptography in Black-Box Implementations https://www.infosecurity-magazine.com/magazine-features/the-dark-side-of-cryptography-kleptography-in/] to show how cryptography could be used to attack host cryptosystems where the malicious resulting system with the embedded cryptologic tool in it resists reverse-engineering and cannot be detected by interacting with the host cryptosystem, as an argument against cryptographic systems and devices given by an external body as "black boxes" as was the
Clipper chip and the
Capstone program.
After the 2013
Snowden affair, the
NIST was believed to have mounted the first kleptographic attack against the American
Federal Information Processing Standard The Federal Information Processing Standards (FIPS) of the United States are a set of publicly announced standards that the National Institute of Standards and Technology (NIST) has developed for use in computer systems of non-military United Stat ...
detailing the
Dual EC DRBG,
essentially exploiting the repeated discrete logarithm based "kleptogram" introduced by Young and Yung.
Awards
* In 2010 he was the annual Distinguished Lecturer of the
International Association for Cryptologic Research at
Eurocrypt.
* In 2013 he became a fellow of the
Association for Computing Machinery.
* In 2014 he received the ESORICS (European Symposium on Research in Computer Security) Outstanding Research Award.
* In 2014 he became a fellow of the
International Association for Cryptologic Research.
* In 2014 he received the ACM's SIGSAC Outstanding Innovation Award.
* In 2015 he became an
IEEE
The Institute of Electrical and Electronics Engineers (IEEE) is an American 501(c)(3) organization, 501(c)(3) public charity professional organization for electrical engineering, electronics engineering, and other related disciplines.
The IEEE ...
fellow.
* In 2017 Yung became a fellow of the
European Association for Theoretical Computer Science.
* In 2018 Yung received the
W. Wallace McDowell Award by the
IEEE Computer Society.
* In 2020 Yung received the Public Key Cryptography Conference's Test of Time Award for his 1998 paper See.
* In 2020 Yung received the IEEE Symposium on Security and Privacy's Test of Time Award for his 1996 paper
on Cryptovirology.
* In 2021 Yung received the Women of the ENIAC
Computer Pioneer Award
* In 2023 Yung was elected a fellow of the
American Academy of Arts and Sciences
The American Academy of Arts and Sciences (The Academy) is one of the oldest learned societies in the United States. It was founded in 1780 during the American Revolution by John Adams, John Hancock, James Bowdoin, Andrew Oliver, and other ...
* In 2024 Yung received the IACR Test of Time Award for his 2009 paper See
[https://iacr.org/testoftime/ IACR Test of Time Awards]
Selected publications
* 1989: ''Universal one-way hash functions and their cryptographic applications'' (with M. Naor; ACM’s STOC).
* 1990: ''Public-key cryptosystems provably secure against chosen ciphertext attacks'' (with M. Naor; ACM’s STOC).
* 1991: ''How to withstand mobile virus attack'' (with Ostrovsky; ACM’s PODC).
* 1992: ''Multi-Receiver/Multi-Sender Network Security: Efficient Authenticated Multicast/Feedback'' (with Desmedt and Frankel; IEEE's INFOCOM 1992)
* 1999: ''Non-Interactive CryptoComputing For NC1'' (with Sander and Young; IEEE's FOCS 1999).
* 2000: ''Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation'' (with Katz; Fast Software Encryption (FSE)).
* 2004: ''Malicious Cryptography: Exposing Cryptovirology'' (with A. Young; Wiley 2004: A book).
* 2009: ''Efficient and secure authenticated key exchange using weak passwords'' (with Katz and Ostrovsky; JACM 57(1)).
* 2009: ''A unified framework for the analysis of side-channel key recovery attacks'' (with Standaert and Malkin; Eurocrypt).
* 2017: ''Generic Semantic Security against a Kleptographic Adversary'' (with A. Russell, Q. Tang, and H-S Zhou; ACM's CCS)
References
External links
Home page at Columbia UniversityGoogle Scholar PageResearch GateLabs website
{{DEFAULTSORT:Yung, Moti
Year of birth missing (living people)
Living people
Modern cryptographers
Columbia School of Engineering and Applied Science alumni
2013 fellows of the Association for Computing Machinery
Fellows of the American Academy of Arts and Sciences
Fellows of the IEEE
International Association for Cryptologic Research fellows
Google employees
IBM employees
IBM Research computer scientists
Computer security academics
Theoretical computer scientists