SlideShare a Scribd company logo
1 of 3
Download to read offline
26 May 2016
EPSRC
Project partner letter of support - Andrei T. Patrascu
Dear fellowship review panel,
SentryBay is a leading security company interested in cutting edge research
involving cryptography and online security. It has recently been listed in the
Cybersecurity 500 list of top companies worldwide and is a global player with
partners in Europe as well as north and south America. In this context, I was
pleased to see that Andrei Patrascu’s academic pursuits overlap with those of
our company in so many ways. His interest in the mathematics of elliptic curves
and his understanding of algebraic geometry, algebraic topology and their
connections with real life cryptographic problems convinced me that his work
will have significant impact on the field of cryptography and that the tools
developed during the time of this fellowship will be of use to the security
industry.
Practically, the cryptographic community is continuously trying to ensure that
encryption protocols in use are based on sound and unambiguous mathematical
principles. While elliptic curve based encryption protocols offer many
advantages from an implementation point of view and are considered to be
generically safe, it is often the case that we have to avoid certain elliptic curves
for which non-generic attacks exist. Andrei’s idea of searching for new pairings
capable of generating new attacks on encryption protocols would certainly
increase online security as it would allow the industry to avoid those curves
susceptible to the new attacks. On the other side, development and
implementation of pairings during past decades allowed the construction of
efficient schemes for pairing based cryptography. The new pairings developed
by Andrei for such schemes would increase the security of devices deployed in
insecure locations. Such methods would be applicable to the mobile phone
industry or to the internet of things. It would also advance the field of identity
based encryption where pairings involving the private key and the ciphertext are
being used in order to decipher a message. Encryption of browser data, secured
online access and data protection would definitely benefit from this type of
research.
Our company is particularly interested in scientific and technological
advancements that would provide us with new ways of avoiding potential
attacks on elliptic curve cryptography and to implement more secure identity
based encryption protocols. SentryBay developed a system for securing
individual files and items of sensitive data within the cloud. Each piece of data
is individually encrypted/uploaded and can be downloaded/decrypted and
accessed securely from any smart device. We are currently working on security
solutions for the Internet of Things, Wearable technologies, Browsing security
and many other areas where encryption is intensively employed. To understand
the mathematics behind such encryption protocols and to know what elliptic
curves may be vulnerable to potential new attacks is therefore of utmost
importance.
Considering this we strongly support Andrei’s application for this fellowship and
I am looking forward to collaborating on the ensuing research. As a contribution
to this fellowship, we are willing to host up to four meetings per year, assign
staff time and provide access to company equipment relevant for the
organization of such meetings. We are also willing to offer expert feedback on
the results obtained and some access to software relevant for the evaluation of
the mathematical tools developed.
This research is of particular importance to us. The information about the new
pairings as well as on the testing of elliptic curves against potential new attacks
is important for the cryptographic industry in general and for SentryBay in
particular. We hope to gain new insights into the problems related to elliptic
curve encryption protocols and into the pairings developed and employed
during the tests on particular elliptic curves. Particularly the practical
implementation of the resulting methods will be the focus of several meetings
during the second half of the fellowship.
We are also willing to contribute towards the public impact of this fellowship.
This includes the press-releases at the debut and during the fellowship as well
as the allocation of resources required for the media outreach and public
engagement.
Andrei’s ability to innovate and to link such diverse domains of research make
him the best choice for conducting a research of such great importance. It is
therefore my pleasure to strongly support Andrei Patrascu’s application for a
fellowship in this field.
Yours sincerely,
David Waterson
Chief Executive Officer

More Related Content

What's hot

Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)CloudMask inc.
 
Probabilistic Approach Networks Project Ideas
Probabilistic Approach Networks Project IdeasProbabilistic Approach Networks Project Ideas
Probabilistic Approach Networks Project IdeasNetwork Simulation Tools
 
Context Aware Privacy Platform
Context Aware Privacy PlatformContext Aware Privacy Platform
Context Aware Privacy PlatformLykle de Vries
 
Emerging Data Privacy and Security for Cloud
Emerging Data Privacy and Security for CloudEmerging Data Privacy and Security for Cloud
Emerging Data Privacy and Security for CloudUlf Mattsson
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security  (IJCIS)International Journal on Cryptography and Information Security  (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)ijcisjournal
 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019Ulf Mattsson
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1fcleary
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019Ulf Mattsson
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
N-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysN-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysSolarwinds N-able
 

What's hot (20)

E2matrix
E2matrixE2matrix
E2matrix
 
Book
BookBook
Book
 
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)
 
FED_COVER
FED_COVERFED_COVER
FED_COVER
 
Probabilistic Approach Networks Project Ideas
Probabilistic Approach Networks Project IdeasProbabilistic Approach Networks Project Ideas
Probabilistic Approach Networks Project Ideas
 
ETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco securityETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco security
 
Context Aware Privacy Platform
Context Aware Privacy PlatformContext Aware Privacy Platform
Context Aware Privacy Platform
 
Emerging Data Privacy and Security for Cloud
Emerging Data Privacy and Security for CloudEmerging Data Privacy and Security for Cloud
Emerging Data Privacy and Security for Cloud
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security  (IJCIS)International Journal on Cryptography and Information Security  (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
E2matrix
E2matrixE2matrix
E2matrix
 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Olive_JbCV[9mar_2k16]
Olive_JbCV[9mar_2k16]Olive_JbCV[9mar_2k16]
Olive_JbCV[9mar_2k16]
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019
 
Stegonography
StegonographyStegonography
Stegonography
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
N-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysN-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 days
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 

Viewers also liked (10)

PWC
PWCPWC
PWC
 
lipogel_jwcref
lipogel_jwcreflipogel_jwcref
lipogel_jwcref
 
scan
scanscan
scan
 
7221 proper brushing
7221 proper brushing7221 proper brushing
7221 proper brushing
 
Ud 4. Mineria, energia i construcció.
Ud 4. Mineria, energia i construcció.Ud 4. Mineria, energia i construcció.
Ud 4. Mineria, energia i construcció.
 
GST Migration & Registration
GST Migration & RegistrationGST Migration & Registration
GST Migration & Registration
 
KRA Profile - 1.8.2016
KRA Profile - 1.8.2016KRA Profile - 1.8.2016
KRA Profile - 1.8.2016
 
Ud 6. Els serveis, la comunicació i la innovació.
Ud 6. Els serveis, la comunicació i la innovació.Ud 6. Els serveis, la comunicació i la innovació.
Ud 6. Els serveis, la comunicació i la innovació.
 
618 семинар
618 семинар618 семинар
618 семинар
 
CV STANTAN DHANEE 2015V22
CV STANTAN DHANEE 2015V22CV STANTAN DHANEE 2015V22
CV STANTAN DHANEE 2015V22
 

Similar to Andrei Patrascu support letter

Attack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingAttack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingOluseyi Akindeinde
 
Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...IRJET Journal
 
Attack Simulation And Threat Modeling -Olu Akindeinde
Attack Simulation And Threat Modeling -Olu AkindeindeAttack Simulation And Threat Modeling -Olu Akindeinde
Attack Simulation And Threat Modeling -Olu AkindeindeBipin Upadhyay
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case StudyEvelyn Donaldson
 
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITYCRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITYIRJET Journal
 
Software Piracy Protection
Software Piracy ProtectionSoftware Piracy Protection
Software Piracy Protectionijtsrd
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12Arindam Paul
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
(In)security in Open Source
(In)security in Open Source(In)security in Open Source
(In)security in Open SourceShane Coughlan
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesIRJET Journal
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCESURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCEAM Publications,India
 
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...Black Duck by Synopsys
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationChadni Islam
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxaudeleypearl
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!DIGITALCONFEX
 

Similar to Andrei Patrascu support letter (20)

Attack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingAttack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_Modeling
 
Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...Review on: Combination of Cryptography and Steganography for Secure File Tran...
Review on: Combination of Cryptography and Steganography for Secure File Tran...
 
Attack Simulation And Threat Modeling -Olu Akindeinde
Attack Simulation And Threat Modeling -Olu AkindeindeAttack Simulation And Threat Modeling -Olu Akindeinde
Attack Simulation And Threat Modeling -Olu Akindeinde
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITYCRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
 
Software Piracy Protection
Software Piracy ProtectionSoftware Piracy Protection
Software Piracy Protection
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
(In)security in Open Source
(In)security in Open Source(In)security in Open Source
(In)security in Open Source
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCESURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
 
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...Open Source Insight:2017 Top 10 IT Security Stories, Breaches, and Predictio...
Open Source Insight: 2017 Top 10 IT Security Stories, Breaches, and Predictio...
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
 
IEEE-SMC-TCHS 2016
IEEE-SMC-TCHS 2016IEEE-SMC-TCHS 2016
IEEE-SMC-TCHS 2016
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 

More from Andrei Patrascu

More from Andrei Patrascu (6)

rice
ricerice
rice
 
list_of_publications
list_of_publicationslist_of_publications
list_of_publications
 
post-license_min_mas1
post-license_min_mas1post-license_min_mas1
post-license_min_mas1
 
CV-mol
CV-molCV-mol
CV-mol
 
list_of_publications
list_of_publicationslist_of_publications
list_of_publications
 
post-license_min_mas1
post-license_min_mas1post-license_min_mas1
post-license_min_mas1
 

Andrei Patrascu support letter

  • 1. 26 May 2016 EPSRC Project partner letter of support - Andrei T. Patrascu Dear fellowship review panel, SentryBay is a leading security company interested in cutting edge research involving cryptography and online security. It has recently been listed in the Cybersecurity 500 list of top companies worldwide and is a global player with partners in Europe as well as north and south America. In this context, I was pleased to see that Andrei Patrascu’s academic pursuits overlap with those of our company in so many ways. His interest in the mathematics of elliptic curves and his understanding of algebraic geometry, algebraic topology and their connections with real life cryptographic problems convinced me that his work will have significant impact on the field of cryptography and that the tools developed during the time of this fellowship will be of use to the security industry. Practically, the cryptographic community is continuously trying to ensure that encryption protocols in use are based on sound and unambiguous mathematical principles. While elliptic curve based encryption protocols offer many advantages from an implementation point of view and are considered to be generically safe, it is often the case that we have to avoid certain elliptic curves for which non-generic attacks exist. Andrei’s idea of searching for new pairings capable of generating new attacks on encryption protocols would certainly increase online security as it would allow the industry to avoid those curves susceptible to the new attacks. On the other side, development and implementation of pairings during past decades allowed the construction of efficient schemes for pairing based cryptography. The new pairings developed by Andrei for such schemes would increase the security of devices deployed in insecure locations. Such methods would be applicable to the mobile phone industry or to the internet of things. It would also advance the field of identity
  • 2. based encryption where pairings involving the private key and the ciphertext are being used in order to decipher a message. Encryption of browser data, secured online access and data protection would definitely benefit from this type of research. Our company is particularly interested in scientific and technological advancements that would provide us with new ways of avoiding potential attacks on elliptic curve cryptography and to implement more secure identity based encryption protocols. SentryBay developed a system for securing individual files and items of sensitive data within the cloud. Each piece of data is individually encrypted/uploaded and can be downloaded/decrypted and accessed securely from any smart device. We are currently working on security solutions for the Internet of Things, Wearable technologies, Browsing security and many other areas where encryption is intensively employed. To understand the mathematics behind such encryption protocols and to know what elliptic curves may be vulnerable to potential new attacks is therefore of utmost importance. Considering this we strongly support Andrei’s application for this fellowship and I am looking forward to collaborating on the ensuing research. As a contribution to this fellowship, we are willing to host up to four meetings per year, assign staff time and provide access to company equipment relevant for the organization of such meetings. We are also willing to offer expert feedback on the results obtained and some access to software relevant for the evaluation of the mathematical tools developed. This research is of particular importance to us. The information about the new pairings as well as on the testing of elliptic curves against potential new attacks is important for the cryptographic industry in general and for SentryBay in particular. We hope to gain new insights into the problems related to elliptic curve encryption protocols and into the pairings developed and employed during the tests on particular elliptic curves. Particularly the practical implementation of the resulting methods will be the focus of several meetings during the second half of the fellowship. We are also willing to contribute towards the public impact of this fellowship.
  • 3. This includes the press-releases at the debut and during the fellowship as well as the allocation of resources required for the media outreach and public engagement. Andrei’s ability to innovate and to link such diverse domains of research make him the best choice for conducting a research of such great importance. It is therefore my pleasure to strongly support Andrei Patrascu’s application for a fellowship in this field. Yours sincerely, David Waterson Chief Executive Officer