
Peter Claus Gutmann is a
computer scientist
A computer scientist is a person who is trained in the academic study of computer science.
Computer scientists typically work on the theoretical side of computation, as opposed to the hardware side on which computer engineers mainly focus ( ...
in the Department of Computer Science at the
University of Auckland
, mottoeng = By natural ability and hard work
, established = 1883; years ago
, endowment = NZD $293 million (31 December 2021)
, budget = NZD $1.281 billion (31 December 2021)
, chancellor = Cecilia Tarrant
, vice_chancellor = Dawn ...
,
Auckland
Auckland (pronounced ) ( mi, Tāmaki Makaurau) is a large metropolitan city in the North Island of New Zealand. The most populous urban area in the country and the fifth largest city in Oceania, Auckland has an urban population of about I ...
,
New Zealand
New Zealand ( mi, Aotearoa ) is an island country in the southwestern Pacific Ocean. It consists of two main landmasses—the North Island () and the South Island ()—and over 700 List of islands of New Zealand, smaller islands. It is the ...
. He has a Ph.D. in computer science from the University of Auckland. His Ph.D. thesis titled and a book based on the thesis were about a cryptographic security architecture. He is interested in
computer security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
issues, including
security architecture
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, th ...
, security
usability
Usability can be described as the capacity of a system to provide a condition for its users to perform the tasks safely, effectively, and efficiently while enjoying the experience. In software engineering, usability is the degree to which a sof ...
(or more usually the lack thereof), and
hardware security
Hardware security as a discipline originated out of cryptographic engineering and involves hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure that the supply chain tha ...
; he has discovered several flaws in publicly released
cryptosystem
In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, such as confidentiality (encryption).
Typically, a cryptosystem consists of three algorithms: one for key generation, one f ...
s and
protocols. He is the developer of the
cryptlib
cryptlib is an open-source cross-platform software security toolkit library. It is distributed under the Sleepycat License, a free software license compatible with the GNU General Public License. Alternatively, cryptlib is available under a pro ...
open source
Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
software security library and contributed to
PGP version 2. In 1994 he developed the
Secure FileSystem (SFS). He is also known for his analysis of data deletion on electronic memory media,
magnetic
Magnetism is the class of physical attributes that are mediated by a magnetic field, which refers to the capacity to induce attractive and repulsive phenomena in other entities. Electric currents and the magnetic moments of elementary particles ...
and otherwise, and devised the
Gutmann method for erasing data from a
hard drive
A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magne ...
more or less securely. Having lived in New Zealand for some time, he has written on such subjects as
weta (a group of insects endemic to New Zealand), and the
Auckland power crisis of 1998, during which the electrical power system failed completely in the central city for five weeks, which he has blogged about. He has also written on his career as an "arms courier" for New Zealand, detailing the difficulties faced in complying with customs control regulations with respect to cryptographic products, which were once classed as "munitions" by various jurisdictions including the United States.
Criticism of Windows Vista
His
white paper
A white paper is a report or guide that informs readers concisely about a complex issue and presents the issuing body's philosophy on the matter. It is meant to help readers understand an issue, solve a problem, or make a decision. A white pape ...
"''Cost Analysis of
Windows Vista
Windows Vista is a major release of the Windows NT operating system developed by Microsoft. It was the direct successor to Windows XP, which was released five years before, at the time being the longest time span between successive releases of ...
Content Protection''", in which he described the content protection specification as "
the longest suicide note in history
"The longest suicide note in history" is an epithet originally used by United Kingdom Labour MP Gerald Kaufman to describe his party's 1983 general election manifesto, which emphasised socialist policies in a more profound manner than previous s ...
",
generated considerable public interest since it was first posted in 2006. He discussed this with
Steve Gibson in episode #74 of the
Security Now! podcast on 2007-01-11.
See also
*
Criticism of Windows Vista
*
Data privacy
Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data ...
*
Gutmann method
*
Information privacy
Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data ...
*
Plaintext
In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted.
Overview
With the advent of com ...
Bibliography
*
*
*
References
Further reading
*
*
*
External links
*
Auckland: Your Y2K beta test site
{{DEFAULTSORT:Gutmann, Peter
Computer security academics
Living people
Modern cryptographers
New Zealand computer scientists
University of Auckland alumni
Cypherpunks
Year of birth missing (living people)