Ronald Linn Rivest (;
born May 6, 1947) is an American
cryptographer
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
and computer scientist whose work has spanned the fields of algorithms and combinatorics, cryptography, machine learning, and election integrity.
He is an
Institute Professor at the
Massachusetts Institute of Technology
The Massachusetts Institute of Technology (MIT) is a Private university, private research university in Cambridge, Massachusetts, United States. Established in 1861, MIT has played a significant role in the development of many areas of moder ...
(MIT),
and a member of MIT's
Department of Electrical Engineering and Computer Science and its
Computer Science and Artificial Intelligence Laboratory.
Along with
Adi Shamir
Adi Shamir (; born July 6, 1952) is an Israeli cryptographer and inventor. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identification sc ...
and
Len Adleman, Rivest is one of the inventors of the
RSA algorithm.
He is also the inventor of the
symmetric key encryption algorithms
RC2,
RC4, and
RC5, and co-inventor of
RC6. (''RC'' stands for "Rivest Cipher".) He also devised the
MD2,
MD4,
MD5
The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as Request for Comments, RFC 1321.
MD5 ...
and
MD6 cryptographic hash function
A cryptographic hash function (CHF) is a hash algorithm (a map (mathematics), map of an arbitrary binary string to a binary string with a fixed size of n bits) that has special properties desirable for a cryptography, cryptographic application: ...
s.
Education
Rivest earned a
bachelor's degree
A bachelor's degree (from Medieval Latin ''baccalaureus'') or baccalaureate (from Modern Latin ''baccalaureatus'') is an undergraduate degree awarded by colleges and universities upon completion of a course of study lasting three to six years ...
in mathematics from
Yale University
Yale University is a Private university, private Ivy League research university in New Haven, Connecticut, United States. Founded in 1701, Yale is the List of Colonial Colleges, third-oldest institution of higher education in the United Stat ...
in 1969, and a
Ph.D. degree in computer science from
Stanford University
Leland Stanford Junior University, commonly referred to as Stanford University, is a Private university, private research university in Stanford, California, United States. It was founded in 1885 by railroad magnate Leland Stanford (the eighth ...
in 1974 for research supervised by
Robert W. Floyd.
Career
At MIT, Rivest is a member of the Theory of Computation Group, and founder of MIT CSAIL's Cryptography and Information Security Group.
Rivest was a founder of
RSA Data Security (now merged with Security Dynamics to form
RSA Security
RSA Security LLC, formerly RSA Security, Inc. and trade name RSA, is an American computer security, computer and network security company with a focus on encryption and decryption standards. RSA was named after the initials of its co-founders, ...
),
Verisign
Verisign, Inc. is an American company based in Reston, Virginia, that operates a diverse array of network infrastructure, including two of the Internet's thirteen root nameservers, the authoritative registry for the , , and generic top-level d ...
, and of
Peppercoin.
His former doctoral students include
Avrim Blum,
Benny Chor,
Sally Goldman,
Burt Kaliski,
Anna Lysyanskaya,
Ron Pinter,
Robert Schapire,
Alan Sherman,
[
and Mona Singh.][
]
Research
Rivest is especially known for his research in cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
. He has also made significant contributions to algorithm
In mathematics and computer science, an algorithm () is a finite sequence of Rigour#Mathematics, mathematically rigorous instructions, typically used to solve a class of specific Computational problem, problems or to perform a computation. Algo ...
design, to the computational complexity
In computer science, the computational complexity or simply complexity of an algorithm is the amount of resources required to run it. Particular focus is given to computation time (generally measured by the number of needed elementary operations ...
of machine learning
Machine learning (ML) is a field of study in artificial intelligence concerned with the development and study of Computational statistics, statistical algorithms that can learn from data and generalise to unseen data, and thus perform Task ( ...
, and to election security.
Cryptography
The publication of the RSA cryptosystem
The RSA (Rivest–Shamir–Adleman) cryptosystem is a public-key cryptosystem, one of the oldest widely used for secure data transmission. The initialism "RSA" comes from the surnames of Ron Rivest, Adi Shamir and Leonard Adleman, who publicly ...
by Rivest, Adi Shamir
Adi Shamir (; born July 6, 1952) is an Israeli cryptographer and inventor. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identification sc ...
, and Leonard Adleman
Leonard Adleman (born December 31, 1945) is an American computer scientist. He is one of the creators of the RSA encryption algorithm, for which he received the 2002 Turing Award. He is also known for the creation of the field of DNA computin ...
in 1978 revolutionized modern cryptography by providing the first usable and publicly described method for public-key cryptography
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
. The three authors won the 2002 Turing Award
The ACM A. M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) for contributions of lasting and major technical importance to computer science. It is generally recognized as the highest distinction in the fi ...
, the top award in computer science, for this work. The award cited "their ingenious contribution to making public-key cryptography useful in practice". The same paper that introduced this cryptosystem also introduced Alice and Bob
Alice and Bob are fictional characters commonly used as placeholders in discussions about cryptography, cryptographic systems and Cryptographic protocol, protocols, and in other science and engineering literature where there are several partici ...
, the fictional heroes of many subsequent cryptographic protocol
A cryptographic protocol is an abstract or concrete Communications protocol, protocol that performs a information security, security-related function and applies cryptographic methods, often as sequences of cryptographic primitives. A protocol desc ...
s. In the same year, Rivest, Adleman, and Michael Dertouzos first formulated homomorphic encryption
Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without first having to decrypt it. The resulting computations are left in an encrypted form which, when decrypted, result in an output th ...
and its applications in secure cloud computing
Cloud computing is "a paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand," according to International Organization for ...
, an idea that would not come to fruition until over 40 years later when secure homomorphic encryption algorithms were finally developed.
Rivest was one of the inventors of the GMR public signature scheme, published with Shafi Goldwasser
Shafrira Goldwasser (; born 1959) is an Israeli-American computer scientist. A winner of the Turing Award in 2012, she is the RSA Professor of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology; a professor o ...
and Silvio Micali
Silvio Micali (born October 13, 1954) is an Italian computer scientist, professor at the Massachusetts Institute of Technology and the founder of Algorand, a proof-of-stake blockchain cryptocurrency protocol. Micali's research at the MIT Compu ...
in 1988,
and of ring signatures, an anonymized form of group signatures invented with Shamir and Yael Tauman Kalai in 2001. He designed the MD4 and MD5
The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as Request for Comments, RFC 1321.
MD5 ...
cryptographic hash function
A cryptographic hash function (CHF) is a hash algorithm (a map (mathematics), map of an arbitrary binary string to a binary string with a fixed size of n bits) that has special properties desirable for a cryptography, cryptographic application: ...
s, published in 1990 and 1992 respectively, and a sequence of symmetric key block cipher
In cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called ''blocks''. Block ciphers are the elementary building blocks of many cryptographic protocols. They are ubiquitous in the storage a ...
s that include RC2, RC4, RC5, and RC6.
Other contributions of Rivest to cryptography include chaffing and winnowing, the interlock protocol for authenticating anonymous key-exchange, cryptographic time capsule
A time capsule is a historic treasure trove, cache of goods or information, usually intended as a deliberate method of communication with future people, and to help future archaeologists, anthropologists, or historians. The preservation of holy ...
s such as LCS35 based on anticipated improvements to computation speed through Moore's law
Moore's law is the observation that the Transistor count, number of transistors in an integrated circuit (IC) doubles about every two years. Moore's law is an observation and Forecasting, projection of a historical trend. Rather than a law of ...
, key whitening and its application through the xor–encrypt–xor key mode in extending the Data Encryption Standard to DES-X, and the Peppercoin system for cryptographic micropayments.
Algorithms
In 1973, Rivest and his coauthors published the first selection algorithm that achieved linear time
In theoretical computer science, the time complexity is the computational complexity that describes the amount of computer time it takes to run an algorithm. Time complexity is commonly estimated by counting the number of elementary operations ...
without using randomization
Randomization is a statistical process in which a random mechanism is employed to select a sample from a population or assign subjects to different groups.Oxford English Dictionary "randomization" The process is crucial in ensuring the random alloc ...
. Their algorithm, the median of medians method, is commonly taught in algorithms courses. Rivest is also one of the two namesakes of the Floyd–Rivest algorithm, a randomized selection algorithm that achieves a near-optimal number of comparisons.
Rivest's 1974 doctoral dissertation concerned the use of hash table
In computer science, a hash table is a data structure that implements an associative array, also called a dictionary or simply map; an associative array is an abstract data type that maps Unique key, keys to Value (computer science), values. ...
s to quickly match partial words in documents; he later published this work as a journal paper. His research from this time on self-organizing lists became one of the important precursors to the development of competitive analysis for online algorithm
In computer science, an online algorithm is one that can process its input piece-by-piece in a serial fashion, i.e., in the order that the input is fed to the algorithm, without having the entire input available from the start. In contrast, an of ...
s. In the early 1980s, he also published well-cited research on two-dimensional bin packing problem
The bin packing problem is an optimization problem, in which items of different sizes must be packed into a finite number of bins or containers, each of a fixed given capacity, in a way that minimizes the number of bins used. The problem has m ...
s, and on channel routing in VLSI design.
He is a co-author of ''Introduction to Algorithms
''Introduction to Algorithms'' is a book on computer programming by Thomas H. Cormen, Charles E. Leiserson, Ron Rivest, Ronald L. Rivest, and Clifford Stein. The book is described by its publisher as "the leading algorithms text in universities w ...
'' (also known as ''CLRS''), a standard textbook on algorithms, with Thomas H. Cormen, Charles E. Leiserson and Clifford Stein
Clifford Seth Stein (born December 14, 1965), a computer scientist, is a professor of industrial engineering and operations research at Columbia University in New York, NY, where he also holds an appointment in the Department of Computer Scien ...
. First published in 1990, it has extended into four editions, the latest in 2022.
Learning
In the problem of decision tree learning
Decision tree learning is a supervised learning approach used in statistics, data mining and machine learning. In this formalism, a classification or regression decision tree is used as a predictive model to draw conclusions about a set of obser ...
, Rivest and Laurent Hyafil proved that it is NP-complete
In computational complexity theory, NP-complete problems are the hardest of the problems to which ''solutions'' can be verified ''quickly''.
Somewhat more precisely, a problem is NP-complete when:
# It is a decision problem, meaning that for any ...
to find a decision tree that identifies each of a collection of objects through binary-valued questions (as in the parlor game of twenty questions) and that minimizes the expected number of questions that will be asked. With Avrim Blum, Rivest also showed that even for very simple neural networks
A neural network is a group of interconnected units called neurons that send signals to one another. Neurons can be either Cell (biology), biological cells or signal pathways. While individual neurons are simple, many of them together in a netwo ...
it can be NP-complete to train the network by finding weights that allow it to solve a given classification task correctly. Despite these negative results, he also found methods for efficiently inferring decision lists, decision trees, and finite automata
A finite-state machine (FSM) or finite-state automaton (FSA, plural: ''automata''), finite automaton, or simply a state machine, is a mathematical model of computation. It is an abstract machine that can be in exactly one of a finite number ...
.
Elections
A significant topic in Rivest's more recent research has been election security, based on the principle of software independence: that the security of elections should be founded on physical records, so that hidden changes to software used in voting systems cannot result in undetectable changes to election outcomes. His research in this area includes improving the robustness of mix networks in this application, the 2006 invention of the ThreeBallot paper ballot based end-to-end auditable voting system (which he released into public domain
The public domain (PD) consists of all the creative work to which no Exclusive exclusive intellectual property rights apply. Those rights may have expired, been forfeited, expressly Waiver, waived, or may be inapplicable. Because no one holds ...
in the interest of promoting democracy),[ and the development of the Scantegrity security system for ]optical scan voting system
An optical scan voting system is an Electronic voting, electronic voting system and uses an Optical reader, optical scanner to read marked paper ballots and Vote counting system, tally the results.
History Marksense systems
While mark sense tech ...
s.
He was a member of the Election Assistance Commission's Technical Guidelines Development Committee.
Honors and awards
Rivest is a member of the National Academy of Engineering
The National Academy of Engineering (NAE) is an American Nonprofit organization, nonprofit, NGO, non-governmental organization. It is part of the National Academies of Sciences, Engineering, and Medicine (NASEM), along with the National Academ ...
, the National Academy of Sciences
The National Academy of Sciences (NAS) is a United States nonprofit, NGO, non-governmental organization. NAS is part of the National Academies of Sciences, Engineering, and Medicine, along with the National Academy of Engineering (NAE) and the ...
, and is a Fellow of the Association for Computing Machinery
The Association for Computing Machinery (ACM) is a US-based international learned society for computing. It was founded in 1947 and is the world's largest scientific and educational computing society. The ACM is a non-profit professional membe ...
, the International Association for Cryptologic Research
The International Association for Cryptologic Research (IACR) is a non-profit scientific organization that furthers research in cryptology and related fields. The IACR was organized at the initiative of David Chaum at the CRYPTO '82 conference. ...
, and the American Academy of Arts and Sciences
The American Academy of Arts and Sciences (The Academy) is one of the oldest learned societies in the United States. It was founded in 1780 during the American Revolution by John Adams, John Hancock, James Bowdoin, Andrew Oliver, and other ...
. Together with Adi Shamir
Adi Shamir (; born July 6, 1952) is an Israeli cryptographer and inventor. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identification sc ...
and Len Adleman, he has been awarded the 2000 IEEE Koji Kobayashi Computers and Communications Award and the Secure Computing Lifetime Achievement Award. He also shared with them the Turing Award
The ACM A. M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) for contributions of lasting and major technical importance to computer science. It is generally recognized as the highest distinction in the fi ...
. Rivest has received an honorary degree (the "laurea honoris causa") from the Sapienza University of Rome
The Sapienza University of Rome (), formally the Università degli Studi di Roma "La Sapienza", abbreviated simply as Sapienza ('Wisdom'), is a Public university, public research university located in Rome, Italy. It was founded in 1303 and is ...
.[Biography](_blank)
Archived fro
on 2011-12-06. In 2005, he received the MITX Lifetime Achievement Award. Rivest was named in 2007 the Marconi Fellow, and on May 29, 2008, he also gave the Chesley lecture at Carleton College
Carleton College ( ) is a Private college, private Liberal arts colleges in the United States, liberal arts college in Northfield, Minnesota, United States. Founded in 1866, the main campus is between Northfield and the approximately Carleton ...
. He was named an Institute Professor at MIT in June 2015.
Selected publications
Rivest's publications include:
Algorithms
Cryptography
Learning
Elections and voting
Personal life
His son is Chris Rivest, entrepreneur and company co-founder.[Cf. Acknowledgements, p.xxi, in Cormen, Rivest, et al.]
''Introduction to Algorithms''
MIT Press
References
External links
List of Ron Rivest's patents on IPEXL
Home page of Ronald L. Rivest
Official site of RSA Security Inc.
Ron Rivest election research papers
*
{{DEFAULTSORT:Rivest, Ron
American cryptographers
1947 births
Living people
American computer security academics
Public-key cryptographers
Election technology people
International Association for Cryptologic Research fellows
Members of the United States National Academy of Sciences
Members of the United States National Academy of Engineering
Turing Award laureates
MIT School of Engineering faculty
Scientists from Schenectady, New York
1994 fellows of the Association for Computing Machinery
Yale University alumni
Timothy Dwight College alumni
Stanford University alumni
People from Arlington, Massachusetts
20th-century American engineers
21st-century American engineers
20th-century American scientists
21st-century American scientists
Mathematicians from New York (state)