{"id":25350,"date":"2014-08-06T21:44:10","date_gmt":"2014-08-07T01:44:10","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25350"},"modified":"2014-08-06T21:44:10","modified_gmt":"2014-08-07T01:44:10","slug":"mount-allison-student-becomes-first-canadian-to-present-at-international-cryptography-conference","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/mount-allison-student-becomes-first-canadian-to-present-at-international-cryptography-conference.php","title":{"rendered":"Mount Allison student becomes first Canadian to present at international cryptography conference"},"content":{"rendered":"<p><p>Published on August 06, 2014                  <\/p>\n<p>      Mount Allison University honours computer science and math      student Karen Korstanje recently presented her research at      the Fourth International Workshop on Cryptography,      Robustness, and Provably Secure Schemes for Female Young      Researchers (CrossFyre 2014) - a conference designed      specifically for women in cryptography - in Bochum, Germany.      Korstanje, originally from Thunder Bay, ON, is the first      Canadian to present at the CrossFyre conference and was one      of only two undergraduate students to attend this year.      \"It was my first time at an international conference so I was      a little nervous to present my research. But it was a very      supportive environment,\" says Korstanje.    <\/p>\n<p>      Mount Allisons Karen Korstanje is the first Canadian to      present at the fourth International Workshop on Cryptography,      Robustness, and Provably Secure Schemes for Female Young      Researchers (CrossFyre 2014). PHOTO SUBMITTED    <\/p>\n<p>    The fourth-year honours student presented new results from her    summer research project in cryptography titled \"Search for Weak    Keys in the Dhall-Pal Cipher,\" supervised by Mount Allison    computer science professor Liam Keliher.  <\/p>\n<p>    Her research has focused on the analysis of the Dhall-Pal    Cipher (DPC), a symmetric-key cipher introduced in 2010. The    DPC was designed to be an efficient alternative to the widely    implemented Advanced Encryption Standard (AES) cipher.    Korstanje and Keliher's work focuses on cryptanalysis,    designing attacks on current systems to show weaknesses.  <\/p>\n<p>    \"The attacks can show weaknesses in the cipher, how the    information is being encrypted. Knowing these allows    programmers to alter their work and makes their systems more    secure,\" explains Korstanje. \"We kind of have to think like a    hacker to prevent different kinds of attacks and identify    weaknesses in different cryptic systems.\"  <\/p>\n<p>    Keliher, who is an expert in cryptography, says \"Karen's work    has revealed that many of the keys used by communicating    parties lead to significant weaknesses in the DPC that allow    encrypted information to be decrypted by an attacker with a    minimum amount of computation (hence the term 'weak keys').    This represents a complete break of the DPC.\"  <\/p>\n<p>    Korstanje and Keliher are now preparing a full paper based on    this work for refereed publication.  <\/p>\n<p>      Mount Allisons Karen Korstanje is the first Canadian to      present at the fourth International Workshop on Cryptography,      Robustness, and Provably Secure Schemes for Female Young      Researchers (CrossFyre 2014). PHOTO SUBMITTED    <\/p>\n<p>    Thanks for voting!  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.sackvilletribunepost.com\/News\/2014-08-06\/article-3825197\/Mount-Allison-student-becomes-first-Canadian-to-present-at-international-cryptography-conference\/1\/RK=0\/RS=5JWof5MbxSXqwfinCqpelUEdnKA-\" title=\"Mount Allison student becomes first Canadian to present at international cryptography conference\">Mount Allison student becomes first Canadian to present at international cryptography conference<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Published on August 06, 2014 Mount Allison University honours computer science and math student Karen Korstanje recently presented her research at the Fourth International Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers (CrossFyre 2014) - a conference designed specifically for women in cryptography - in Bochum, Germany. Korstanje, originally from Thunder Bay, ON, is the first Canadian to present at the CrossFyre conference and was one of only two undergraduate students to attend this year. \"It was my first time at an international conference so I was a little nervous to present my research. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-25350","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25350"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25350"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25350\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}