Secure Systems and Cryptology

My research focuses on the architecture and design of secure systems based on cryptographic techniques, analysis of secure systems against practical attack models, and on finding new cryptographic primitives and techniques. This work has led directly to several new cryptographic concepts, including: “Remotely-Keyed Encryption,” which allows the use of inexpensive, low-bandwidth secure hardware to protect high-bandwidth communication and stored data, “Atomic Proxy Cryptography,” which allows re-encryption by untrusted third parties, and “Master-Key Encryption,” which provides a systematic way to design (and study) ciphers with built-in “back doors.”

I am especially interested in the use of encryption to protect insecure systems such as the Internet. I was a designer of swipe, a predecessor of the now standard IPSEC protocol for protecting Internet traffic. Another project, CFS, investigated and demonstrated the feasibility of including encryption as file system service.

Recently, I’ve applied cryptologic techniques to other areas, including the analysis of physical security systems; this work yielded a powerful and practical attack against virtually all commonly used master-keyed mechanical locks.

Trust Management

I coined the term, and am one of the inventors of, Trust Management, which provides the abstract layer in which a system decides whether to allow some potentially dangerous action. This work has led to two trust management languages, KeyNote and PolicyMaker, that provide tools for specifying policy, delegating authority, and controlling access. In addition to providing a useful framework for studying and proving security properties of distributed systems, our tools have been used to build powerful policy control mechanisms into several important applications, including the OpenBSD IPSEC implementation.

Technology and Public Policy

Cryptology and computer security have important relationships to vital areas of public policy, and my work has touched on these in several ways. In 1994, I discovered a serious flaw in the US Government’s “Clipper” encryption system, which had been proposed as a mechanism for the public to encrypt their data in a way that would still allow access by law enforcement. I have edited several influential reports on encryption policy, including the 1998 study of “key escrow” systems that demonstrated that such systems are inherently less secure and more expensive than systems without such a feature. This work contributed to the recent shift in U.S. encryption policy. More recently, I have been active in the analysis of the FBI’s “Carnivore” Internet wiretap system. I have testified before various comittees of the US Congress and European Parliament several times, providing technical perspective on the problems surrounding law enforcement and intelligence access to communications traffic and computer data.

Scholarship

Contributions to Law Reviews and Other Scholarly Journals

Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Jon Callas, Whitfield Diffie, Susan Landau, Peter G. Neumann et al., Bugs In Our Pockets: The Risks of Client-Side Scanning, 10 J. Cybersecurity, no. tyad020, 2024 at 1-18. [WWW]
Steven M. Bellovin, Matt Blaze, Susan Landau & Brian Owsley, Seeking the Source: Criminal Defendants’ Constitutional Right to Source Code, 17 Ohio St. Tech. L.J. 1-73 (2021).
[WWW] [W] [L]
Matt Blaze, Election Integrity and Technology: Vulnerabilities and Solutions, 4 Geo. L. Tech. Rev. 505-522 (2020).
[WWW] [W] [L]

Congressional Testimony

2020 Election Security—Perspectives from Voting System Vendors and Experts: Hearing Before the H. Comm. on House Admin., 116th Cong., Jan. 9, 2020 (Statement of Matt Blaze) (CIS-No.: 2020-H421-2012866).
[WWW]
The Road to 2020: Defending Against Election Interference: Hearing Before the Subcomm. on Cybersecurity, Infrastructure Prot. & Innovation of the H. Comm. on Homeland Sec., 116th Cong., Nov. 19, 2019 (Statement of Matt Blaze) (CIS-No.: 2020-H411-207098).
[WWW]