Welcome to Greg Rose's Home Page

tall, thick and hairy plastic Greg Greg looks all right in a suit, and has even been a magazine cover model! Of course, Greg got older. This is a 2007 professional photo.


Personal Statement 2015-06-25

It's a week after a racist looney assassinated a bunch of people at a church in Charleston, South Carolina. As the event happened, I was rushing to the Emergency Room at the local hospital. I didn't really rejoin the world for about three days. Actually I'm writing this from hospital, hoping to finally get out tomorrow.

Anyway, I awoke to a serious nationwide debate about whether this qualifies as an act of terrorism or not. I don't understand this debate; single looney, multiple premeditated murders. It's tragic no matter how you look at it, and completely irrelevant whether you call it terrorism or not.

I also awoke to an even bigger debate and a lot of unilateral actions to remove the confederate flag from all sorts of places, such as gun stores, museum shops, monuments, houses of state governments, Target and WalMart stores. Now I'm actually a little conflicted on this issue, because I believe in the right of free speech. I've been associated with the ACLU for some years, and we like defending everyone's rights, even people we detest.

I've never understood the US's obsession with flags. But I am seeing a lot of confused and confusing arguments that don't seem to get that a flag is a symbol -- a placeholder -- and the problem is what it is symbolic of, not the flag itself.

But here's what I didn't awake to:

  • Any discussion of the victims of this heinous crime. In fact, I had to ask my wife what was going on? Almost all details had disappeared from the media in only three days. One of the victims was a reknowned minister and state senator; the others I still know little or nothing about. Yes, I could dig and find out, but that's not my point. In 2007, one of my previous diatribes talked about a mass shooting at Virginia Tech; in that case I commented about the fact that there was so much information about the victims. I wonder what the difference is here? Oh, yeah, maybe that the victims were all black in this case.
  • Any serious discussion of racism. Clearly the crime was racially motivated. But the country seems unable to rationally discuss the many and varied issues of racial justice and immigration, and the disparity of economic opportunity behind them.
  • Any discussion at all of gun control. That's just nuts. It'll be impossible to buy a confederate flag at Target and maybe one day it'll be banned like Nazi symbols in Europe. But I can still go into the same Target store and buy the same gun this wacko used to kill 9 people.

    I like nifty technology. Guns, like it or not, are highly evolved nifty technology. I don't know the ACLU position on the Second Amendment -- I never asked. I personally believe they should be much more heavily regulated than they are currently. But let's at least have a real discussion!

    Please, let's have the important discussions.

    The people who I think are trying very hard to work on these issues are The Southern Poverty Law Center .

    Previous diatribes


    Cryptography and Security

    Some interesting cryptographic utilities and papers can be found at QUALCOMM's open source portal. (These used to be at qualcomm.com.au.)

    Greg uses cryptography extensively, and has some interesting links. His various PGP public keys are available (if you can't use the newer style Diffie-Hellman/DSS keys you need this instead). Note that Greg uses a multi-level key scheme, with a very secure top level key and less secure keys for personal/USENIX and QUALCOMM related work. Or you can use S/MIME encryption with this CAcert certificate. Secure voice / text: Seecrypt greg.rose@seecrypt.com (this is as close as you'll get to a phone number on this web page).

    He also developed the PGP Moose which allows newsgroup moderators to authenticate postings, and which automatically cancels unauthentic postings. This is still in use but not really supported any more.

    Greg was the Program Chair for USENIX's Sixth USENIX Security Symposium focusing on Applications of Cryptography and was invited talks coordinator for the 7th USENIX Security Symposium  For the Eigth, he was Works-In-Progress coordinator. For the Ninth, he was Program Co-Chair with Steve Bellovin. Tenth, Invited talks coordinator again. Taking a rest. He worked on a PGP key signing service and electronic voting for USENIX.

    Greg was a member of the Board of the International Association for Cryptologic Research, by virtue of having served as General Chair of Crypto'03. Recently re-elected as treasurer on the board again 2011-2017.

    Greg developed the SOBER family (including Turing, NLS, Shannon and Boole) of stream ciphers for embedded application. This and other software and publications can be found at QUALCOMM's open source portal.

    Greg is proud to be founding life member #1 of LOPSA, the League of Professional System Administrators, for which he was also on the leadership committee.


    Greg for a while became President of CAcert, Inc, a not-for-profit Certificate Authority that issues free certificates based on a web-of-trust identification model.

    Greg is the lesser co-author of BigNum Math cover picture with Tom St Denis.

    Greg supports the American Civil Liberties Union of San Diego and Imperial Counties , The Southern Poverty Law Center and Planned Parenthood of the Pacific Southwest .


    About Greg Rose

    University of New South Wales B.Sc. (honours) in Computer Science, awarded the University Medal in 1977.

    Founder and Managing Director of Fawnray Pty Ltd (became Neology Ltd). Founder and Managing Director of Softway Pty Ltd, became AUREMA, sold to Citrix in 2006, long after Greg left. Visiting Scientist at IBM's Thomas J. Watson Research Center in 1991. Manager of the Open Distributed Systems Program at the Australian Computing and Communications Institute. UNIX product engineer for Sterling Software. Joined QUALCOMM in July 1996 as a senior staff engineer/manager, working on cryptography and authentication for CDMA cellular phone systems, and to set up the office of QUALCOMM Australia.  Moved to the USA in 2004. Was senior vice president of engineering, in the office of the chief scientist, with responsibility for day to day management of up to 230 researchers.

    In January 2014, left Qualcomm to refresh technical skills in security and cryptography, and devote more time to extracurricular activities such as not-for-profit organizations. Available for consulting. Helping out a very nice restaurant, Kitchen 4140 San Diego.

    Involved with the use and development of the UNIX Operating System since its arrival in Australia in 1974. Founding secretary and past president of AUUG. Founding treasurer of SAGE-AU, the System Administrator's Guild of Australia. Past Vice President of the USENIX Association. Past Member of the Board of Directors of the International Association for Cryptologic Research. President of CAcert, a free certificate authority.

    Experienced teacher at university and in private courses, mostly involving cryptography and security, programming languages, operating systems, and implications of software and hardware technology.


    Many years ago now (2001, last minor revision in 2004), I wrote a full day tutorial called "Cryptographic Algorithms Revealed". Here are the slides and printable notes pages. This is the original blurb for the course:

    This tutorial will require some mathematical background from
    attendees. At the very least, familiarity with common mathematical
    notation, polynomials, and some elementary statistical knowledge will
    be needed. You've been warned.
    In this advanced tutorial, attendees will get a fairly detailed overview
    of what makes cryptographic algorithms work, and when they don't work,
    how they are broken. Some of the AES finalists are covered to provide
    lessons in block ciphers, with the winner (Rijndael) treated in depth.
    Topics covered (unless time runs out):
    Brief History
           substitution and transposition
           development of DES
           public key cryptography
    Symmetric Block Ciphers
           Feistel ciphers generally
           Other AES Candidates (Twofish, RC6, Serpent)
           Rijndael (AES) in depth
           Block Cipher modes of operation
    Symmetric Stream Ciphers
           Linear Feedback Shift Registers
           A5, SOBER and other LFSR based constructions
           Differential & Linear cryptanalysis
           Attack assumptions and threat models
           Attacks on stream ciphers
    Public Key systems
           Group and Finite field theory
           Discrete Log systems (El Gamal, Diffie-Hellman, DSS)
           Elliptic curves
    Other stuff:
           Hash functions, SHA-1, SHA-256

    Recently, people have been asking me for some of my old publications (generally not crypto related). Many of them are in archaic formats. When I get a round tuit, I might put more of them here. For the moment, here is:

  • God of Backups

    I wrote a paper KISS: A Bit Too Simple (at IACR's EPRINT server). Here are the corresponding presentation slides.

    I was (Oct 2011) keynote speaker at the CIPHERTEC WORKSHOP on the THEORY and APPLICATIONS of CRYPTOGRAPHY in Pretoria, South Africa (not my capitalization!). Here are the slides from my talk about stream ciphers.


    This web page was carefully handwritten by me, using archaic tools like vi. If you have comments, please send them to ggr@seer-grog.net

    Greg Rose (ggr@seer-grog.net)