Knowledge (XXG)

Information Security Group

Source 📝

727: 47: 1261: 866: 880: 280: 527: 675: 152: 774: 1241: 1071: 402: 43:, and the current director is Professor Lizzie Coles-Kemp. Previous directors include Professors Peter Komisarczuk, Keith Martin, Keith Mayes, Chris Mitchell and Peter Wild. 751: 668: 579: 62:. It has also been awarded the status of Academic Centre of Excellence in Cyber Security Research (ACE-CSR) and hosts a Centre for Doctoral Training in cyber security. 166:
The ISG also includes a Systems Security Research Lab (S2Lab), which was created in 2014, to investigate how to protect systems from software related threats, such as
39:. It has around 25 established academic posts, 7 visiting Professors or Fellows and over 90 research students. The Founder Director of the ISG was the late Professor 69:
in information security, being the first university in the world to offer a postgraduate course in the subject. In 2014 this course received full certification from
82: 1289: 924: 870: 661: 884: 841: 460: 70: 818: 684: 120: 512: 486: 427:
Ciechanowicz, Chez; Martin, Keith M.; Piper, Fred C.; Robshaw, Matthew J. B. (1 January 2003). Irvine, Cynthia; Armstrong, Helen (eds.).
147:, and general embedded/implementation system security. In 2008, the SCC was commissioned to perform a counter expertise review of the 119:
The ISG includes the Smart Card and IoT Security Centre (previously named Smart Card Centre, SCC) that was founded in October 2002 by
917: 444: 797: 88:
Research topics addressed by the ISG include: the design and evaluation of cryptographic algorithms, protocols and key management;
554: 1120: 210: 136: 97: 716: 330: 155:. The SCC has received support from a number of industrial partners, such as Orange Labs (UK), the UK Cards Association, 910: 55: 726: 1236: 1191: 1004: 214: 116:(IoT); and human related aspects of cyber security. The current director of Research is Professor Stephen Wolthusen. 1115: 528:"20083843 Bijlage 1 OV Chipkaart 'Counter Expertise' Review of the TNO security analysis of the Dutch OV-Chipkaart" 1231: 1221: 1211: 1066: 823: 140: 1216: 1206: 1009: 969: 962: 952: 947: 957: 128: 1264: 1110: 1056: 746: 179: 109: 50:
Royal Holloway's Founder's Building, where the ISG Smart Card and IoT Security Centre (SCC) was located.
813: 605: 1226: 1150: 761: 695: 224:
Royal Holloway's Information Security Group has been mentioned in popular media, most notably in the
156: 59: 36: 163:. The current director of the Smart Card and IoT Security Centre is Dr. Konstantinos Markantonakis. 989: 255: 105: 1095: 1079: 1026: 431:. IFIP — The International Federation for Information Processing. Springer US. pp. 215–230. 375: 144: 113: 461:"Developing the Cyber Experts of the future - GCHQ certifies Master's Degrees in Cyber Security" 1155: 1145: 1016: 440: 230: 89: 66: 46: 305: 1090: 432: 194: 187: 183: 175: 851: 741: 387: 174:. The research in the lab covers many different Computer Science-related topics, such as 1165: 1085: 1046: 994: 979: 792: 653: 202: 198: 32: 28: 1283: 1246: 1201: 1160: 1140: 1036: 999: 974: 769: 31:. It is part of the Engineering, Physical Sciences and Mathematics School (EPMS) at 1196: 1041: 1031: 1021: 984: 933: 206: 148: 436: 1175: 356: 218: 1135: 1105: 1100: 1061: 132: 108:; mobile telecommunications security; authentication and identity management; 101: 93: 40: 403:"Information security: students aim to peer into the mind of the cyber thief" 1125: 648: 513:"Three universities gain recognition for their top cyber security education" 235: 1170: 1130: 160: 124: 27:) is one of the oldest academic departments focusing on Information and 167: 1051: 846: 171: 135:, applications and related technologies: its research topics include 45: 906: 657: 643: 355:
correspondent, Sean Coughlan BBC News education (9 May 2013).
256:"Royal Holloway | Staff Directory | Information Security home" 153:
Dutch Ministry of Transport, Public Works and Water Management
638: 633: 306:"Academic Centres of Excellence in Cyber Security Research" 775:
List of Principals of Royal Holloway, University of London
487:"Royal Holloway wins Best Cyber Security Education Award" 1072:
Cryptographically secure pseudorandom number generator
357:"£7.5m university fund to train cybersecurity experts" 77:
at SC Awards Europe 2017 and in 2021 it was awarded
898: 429:
Ten Years of Information Security Masters Programmes
1184: 940: 834: 806: 785: 752:
List of Royal Holloway, University of London people
734: 704: 193:Current and former associated academics include 918: 669: 8: 649:Royal Holloway, University of London website 555:"Phone invaders: The rise of mobile malware" 131:, for training and research in the field of 58:in recognition of its work in the field of 925: 911: 903: 899: 676: 662: 654: 331:"CDT in Cyber Security at Royal Holloway" 842:Association of Commonwealth Universities 526:Waterstaat, Ministerie van Verkeer en. 247: 75:Best Cyber Security Education Programme 383: 373: 644:Systems Security Research Lab website 83:National Cyber Security Centre (NCSC) 7: 1290:Royal Holloway, University of London 879: 686:Royal Holloway, University of London 606:"Write-up boost for Royal Holloway" 73:. In 2017 it won the award for the 16:Academic information security group 634:Information Security Group website 14: 1260: 1259: 878: 865: 864: 725: 401:Davidson, Max (23 March 2012). 65:In 1992, the ISG introduced an 1121:Information-theoretic security 798:Royal Holloway Students' Union 54:In 1998 the ISG was awarded a 1: 717:Institute of Musical Research 580:"Honorary and visiting staff" 437:10.1007/978-0-387-35694-5_21 285:royalanniversarytrust.org.uk 1237:Message authentication code 1192:Cryptographic hash function 1005:Cryptographic hash function 1306: 1116:Harvest now, decrypt later 712:Information Security Group 584:Information Security Group 21:Information Security Group 1255: 1232:Post-quantum cryptography 902: 860: 723: 693: 639:Smart Card Centre website 56:Queen's Anniversary Prize 1222:Quantum key distribution 1212:Authenticated encryption 1067:Random number generation 281:"Previous Prize-winners" 141:Near Field Communication 1217:Public-key cryptography 1207:Symmetric-key algorithm 1010:Key derivation function 970:Cryptographic primitive 963:Authentication protocol 953:Outline of cryptography 948:History of cryptography 143:(NFC), mobile devices, 129:Giesecke & Devrient 958:Cryptographic protocol 110:cyber-physical systems 51: 1111:End-to-end encryption 1057:Cryptojacking malware 747:Elizabeth Jesser Reid 553:Campbell, MacGregor. 180:computer architecture 112:; embedded security; 49: 19:Founded in 1990, the 1227:Quantum cryptography 1151:Trusted timestamping 697:University of London 157:Transport for London 60:information security 37:University of London 990:Cryptographic nonce 491:royalholloway.ac.uk 260:royalholloway.ac.uk 106:security management 102:electronic commerce 1096:Subliminal channel 1080:Pseudorandom noise 1027:Key (cryptography) 814:Founder's Building 762:The Princess Royal 386:has generic name ( 114:Internet of Things 52: 1277: 1276: 1273: 1272: 1156:Key-based routing 1146:Trapdoor function 1017:Digital signature 896: 895: 604:Macleod, Donald. 231:The Da Vinci Code 176:operating systems 90:provable security 1297: 1263: 1262: 1091:Insecure channel 927: 920: 913: 904: 900: 887: 882: 881: 873: 868: 867: 729: 698: 687: 678: 671: 664: 655: 621: 620: 618: 616: 601: 595: 594: 592: 590: 576: 570: 569: 567: 565: 550: 544: 543: 541: 539: 532:rijksoverheid.nl 523: 517: 516: 509: 503: 502: 500: 498: 483: 477: 476: 474: 472: 457: 451: 450: 424: 418: 417: 415: 413: 398: 392: 391: 385: 381: 379: 371: 369: 367: 352: 346: 345: 343: 341: 327: 321: 320: 318: 316: 302: 296: 295: 293: 291: 277: 271: 270: 268: 266: 252: 195:Whitfield Diffie 188:machine learning 184:program analysis 1305: 1304: 1300: 1299: 1298: 1296: 1295: 1294: 1280: 1279: 1278: 1269: 1251: 1180: 936: 931: 897: 892: 885: 871: 856: 852:Universities UK 830: 824:Bedford College 802: 781: 742:Thomas Holloway 730: 721: 700: 696: 689: 685: 682: 630: 625: 624: 614: 612: 603: 602: 598: 588: 586: 578: 577: 573: 563: 561: 552: 551: 547: 537: 535: 525: 524: 520: 511: 510: 506: 496: 494: 485: 484: 480: 470: 468: 467:(Press release) 459: 458: 454: 447: 426: 425: 421: 411: 409: 407:Telegraph.co.uk 400: 399: 395: 382: 372: 365: 363: 354: 353: 349: 339: 337: 329: 328: 324: 314: 312: 304: 303: 299: 289: 287: 279: 278: 274: 264: 262: 254: 253: 249: 244: 17: 12: 11: 5: 1303: 1301: 1293: 1292: 1282: 1281: 1275: 1274: 1271: 1270: 1268: 1267: 1256: 1253: 1252: 1250: 1249: 1244: 1242:Random numbers 1239: 1234: 1229: 1224: 1219: 1214: 1209: 1204: 1199: 1194: 1188: 1186: 1182: 1181: 1179: 1178: 1173: 1168: 1166:Garlic routing 1163: 1158: 1153: 1148: 1143: 1138: 1133: 1128: 1123: 1118: 1113: 1108: 1103: 1098: 1093: 1088: 1086:Secure channel 1083: 1077: 1076: 1075: 1064: 1059: 1054: 1049: 1047:Key stretching 1044: 1039: 1034: 1029: 1024: 1019: 1014: 1013: 1012: 1007: 997: 995:Cryptovirology 992: 987: 982: 980:Cryptocurrency 977: 972: 967: 966: 965: 955: 950: 944: 942: 938: 937: 932: 930: 929: 922: 915: 907: 894: 893: 891: 890: 876: 861: 858: 857: 855: 854: 849: 844: 838: 836: 832: 831: 829: 828: 827: 826: 816: 810: 808: 804: 803: 801: 800: 795: 793:Insanity Radio 789: 787: 783: 782: 780: 779: 778: 777: 764: 755: 754: 749: 744: 738: 736: 732: 731: 724: 722: 720: 719: 714: 708: 706: 702: 701: 694: 691: 690: 683: 681: 680: 673: 666: 658: 652: 651: 646: 641: 636: 629: 628:External links 626: 623: 622: 596: 571: 545: 518: 504: 478: 452: 445: 419: 393: 347: 322: 297: 272: 246: 245: 243: 240: 226:New York Times 211:Michael Walker 203:David Naccache 199:Kenny Paterson 121:Royal Holloway 81:status by the 33:Royal Holloway 29:Cyber Security 15: 13: 10: 9: 6: 4: 3: 2: 1302: 1291: 1288: 1287: 1285: 1266: 1258: 1257: 1254: 1248: 1247:Steganography 1245: 1243: 1240: 1238: 1235: 1233: 1230: 1228: 1225: 1223: 1220: 1218: 1215: 1213: 1210: 1208: 1205: 1203: 1202:Stream cipher 1200: 1198: 1195: 1193: 1190: 1189: 1187: 1183: 1177: 1174: 1172: 1169: 1167: 1164: 1162: 1161:Onion routing 1159: 1157: 1154: 1152: 1149: 1147: 1144: 1142: 1141:Shared secret 1139: 1137: 1134: 1132: 1129: 1127: 1124: 1122: 1119: 1117: 1114: 1112: 1109: 1107: 1104: 1102: 1099: 1097: 1094: 1092: 1089: 1087: 1084: 1081: 1078: 1073: 1070: 1069: 1068: 1065: 1063: 1060: 1058: 1055: 1053: 1050: 1048: 1045: 1043: 1040: 1038: 1037:Key generator 1035: 1033: 1030: 1028: 1025: 1023: 1020: 1018: 1015: 1011: 1008: 1006: 1003: 1002: 1001: 1000:Hash function 998: 996: 993: 991: 988: 986: 983: 981: 978: 976: 975:Cryptanalysis 973: 971: 968: 964: 961: 960: 959: 956: 954: 951: 949: 946: 945: 943: 939: 935: 928: 923: 921: 916: 914: 909: 908: 905: 901: 889: 888: 877: 875: 874: 863: 862: 859: 853: 850: 848: 845: 843: 840: 839: 837: 833: 825: 822: 821: 820: 817: 815: 812: 811: 809: 805: 799: 796: 794: 791: 790: 788: 784: 776: 773: 772: 771: 770:Julie Sanders 768: 765: 763: 760: 757: 756: 753: 750: 748: 745: 743: 740: 739: 737: 733: 728: 718: 715: 713: 710: 709: 707: 703: 699: 692: 688: 679: 674: 672: 667: 665: 660: 659: 656: 650: 647: 645: 642: 640: 637: 635: 632: 631: 627: 611: 607: 600: 597: 585: 581: 575: 572: 560: 559:New Scientist 556: 549: 546: 533: 529: 522: 519: 514: 508: 505: 493:. 7 June 2017 492: 488: 482: 479: 466: 462: 456: 453: 448: 446:9781475764918 442: 438: 434: 430: 423: 420: 408: 404: 397: 394: 389: 377: 362: 358: 351: 348: 336: 332: 326: 323: 311: 307: 301: 298: 286: 282: 276: 273: 261: 257: 251: 248: 241: 239: 237: 233: 232: 227: 222: 220: 216: 212: 208: 204: 200: 196: 191: 189: 185: 181: 177: 173: 169: 164: 162: 158: 154: 150: 146: 142: 138: 134: 130: 126: 122: 117: 115: 111: 107: 103: 99: 95: 91: 86: 84: 80: 76: 72: 68: 63: 61: 57: 48: 44: 42: 38: 34: 30: 26: 22: 1197:Block cipher 1042:Key schedule 1032:Key exchange 1022:Kleptography 985:Cryptosystem 934:Cryptography 883: 869: 786:Student life 766: 758: 711: 705:Subdivisions 613:. Retrieved 610:The Guardian 609: 599: 587:. Retrieved 583: 574: 562:. Retrieved 558: 548: 536:. Retrieved 531: 521: 507: 495:. Retrieved 490: 481: 469:. Retrieved 464: 455: 428: 422: 410:. Retrieved 406: 396: 364:. Retrieved 360: 350: 338:. Retrieved 334: 325: 313:. Retrieved 309: 300: 288:. Retrieved 284: 275: 263:. Retrieved 259: 250: 229: 225: 223: 207:Matt Robshaw 192: 165: 149:OV-chipkaart 118: 87: 78: 74: 64: 53: 24: 20: 18: 1185:Mathematics 1176:Mix network 759:Chancellor: 465:gchq.gov.uk 384:|last= 335:epsrc.ac.uk 310:epsrc.ac.uk 228:bestseller 219:Igor Muttik 215:Sean Murphy 133:Smart cards 94:smart cards 1136:Ciphertext 1106:Decryption 1101:Encryption 1062:Ransomware 835:Affiliates 767:Principal: 534:(in Dutch) 242:References 41:Fred Piper 1126:Plaintext 376:cite news 236:Dan Brown 1284:Category 1265:Category 1171:Kademlia 1131:Codetext 1074:(CSPRNG) 872:Category 564:11 March 538:11 March 471:11 March 412:11 March 366:11 March 361:BBC News 340:11 March 315:11 March 290:11 March 125:Vodafone 941:General 886:Commons 819:History 497:28 July 265:7 March 172:botnets 168:malware 151:by the 1052:Keygen 847:SEPnet 735:People 589:20 May 443:  186:, and 1082:(PRN) 807:Other 615:9 May 617:2019 591:2019 566:2016 540:2016 499:2019 473:2016 441:ISBN 414:2016 388:help 368:2016 342:2016 317:2016 292:2016 267:2016 217:and 170:and 161:ITSO 159:and 137:RFID 127:and 98:RFID 79:gold 71:GCHQ 433:doi 234:by 145:IoT 67:MSc 25:ISG 1286:: 608:. 582:. 557:. 530:. 489:. 463:. 439:. 405:. 380:: 378:}} 374:{{ 359:. 333:. 308:. 283:. 258:. 238:. 221:. 213:, 209:, 205:, 201:, 197:, 190:. 182:, 178:, 139:, 123:, 104:; 100:; 96:; 92:; 85:. 35:, 926:e 919:t 912:v 677:e 670:t 663:v 619:. 593:. 568:. 542:. 515:. 501:. 475:. 449:. 435:: 416:. 390:) 370:. 344:. 319:. 294:. 269:. 23:(

Index

Cyber Security
Royal Holloway
University of London
Fred Piper

Queen's Anniversary Prize
information security
MSc
GCHQ
National Cyber Security Centre (NCSC)
provable security
smart cards
RFID
electronic commerce
security management
cyber-physical systems
Internet of Things
Royal Holloway
Vodafone
Giesecke & Devrient
Smart cards
RFID
Near Field Communication
IoT
OV-chipkaart
Dutch Ministry of Transport, Public Works and Water Management
Transport for London
ITSO
malware
botnets

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.