http://www.mcg.org.br/eg.htm

Edgardo Gerck, Dr. rer.nat., M. Sc., Electronic Engineer.

Ed Gerck has been at the forefront of developments in Internet security,
with five recent patents filed on Internet voting. He received his doctorate
in physics (Dr.rer.nat.) from the Ludwig-Maximilians-Universitaet and the
Max-Planck-Institut fuer Quantenoptik in Munich, Germany, in 1983,
with maximum thesis grade (“sehr gut”). He has worked in cryptography
since 1987.  Dr. Gerck is the founder of the Meta-Certificate Group (MCG),
chief executive officer and vice-president of technology of Safevote, Inc.,
and chairman of the board of the Internet Voting Technology Alliance
(IVTA) of Washington, D.C.

Ed Gerck was appointed in 1999 to the NSI's RAB  -- Registry
Advisory Board of Network Solutions, Inc., Herndon, VA, US,
and currently serves in advisory capacities with several companies.

He has also developed methods for traceless laser erasing of conventional
signatures on paper and other media as a proof of lack of security for
conventional signatures, as well as methods for tamperproof laser
signature of documents and parts, with key-, date-and context-dependent
signatures. Documents with more than 400 pages have been laser signed,
all pages at once.

He has developed  a new laser stereolithographic thermal technique to
build accurate 3D models, a new low-cost tactile display for the
vision-impaired, a new air-gap monitoring device for large electric
rotating machines (patented, 50% with ASEA BROWN BOVERI), a new
method of high-precision laser cutting with position feedback called
geometric superpulse, new software and methods to create large (30
meters) and precise (1 mm) 3D structures by laser lamination, a new
method to measure profile depth by laser photo-thermolectric effect,
and other developments in the area of material processing, lasers and
precise control software.

His frequent cooperation work at various Internet fora, such as
e-carm, ssl-talk, ssl, cert-talk, dig-sig, sci.crypt, itanet, SEIS,
ssl-users, dig-cert, mcg-talk, trust-ref, seguranca, etc. has
resulted in leading Internet discussions on issues of security and
privacy in networks of networks.

He has done and coordinated the development of software since 1972, in
languages such as FORTRAN, ALGOL, BASIC, x86/x87 Assembler,
Pascal, C, C++, Java, Perl, PHP and others, for DOS, Windows and
Unix platforms.

He has authored more than one hundred technical papers, published in
international journals, seminar proceedings, research reports and
patents. He has also published hundreds of Internet reports, papers,
expositions and drafts, favoring the Internet as a research tool. One
of his Internet papers, "Overview of Certification Systems: X.509,CA,
PGP and SKIP" [http://www.thebell.net/papers/certover.pdf] was
downloaded more than 65,000 times in its first year and is a standard
Internet
reference on these subjects. His paper "Toward Real-World Models of
Trust: Reliance on Received Information"
[http://www.mcg.org.br/trustdef.htm]
has been cited in books, thesis and is a standard reference on the subject
of
trust -- from security systems and communication processes to social
relationships. Dr. Gerck's most recent papers on security are available
at the MCG site, at [http://www.mcg.org.br/papers.htm] and also at The
Bell [http://www.thebell.net], a newsletter on privacy and security
technology
in Internet voting.

His current work is centered on the frontier aspects of cryptography,
information security and information theory for networks of networks
or internets.  In particular, he frequently makes the point that: (i) not
only the Internet itself but also traditional commerce, e-commerce,
management  structures,  etc. can all be recognized as internets and,
(ii) their use can be bridged by a common approach, which is an
abstract model for internet communication systems. "Coherence" emerges
as the basic property of such systems and leads to real-world based but
formal concepts of trust, information, meaning, identification,
authentication, non-repudiation, privacy, security, etc. – which are
used to define a communication theory for internets, valid for any
networks of networks.  In his "bottom-up" approach, security is not
an added-on property to information but itself part of the
communication model for internets. This goes beyond the current
technology used in X.509, PKIX, S/MIME, SSL and PGP to provide
information security to networks, which is based on the use of
authorization lists, encryption and digital signatures.  In fact,
Dr. Gerck believes that mistaking the Internet for a network is a
basic security flaw in such protocols but one which is unseen today –
though its effects pervade the Internet.

Dr. Gerck’s work in information security gained worldwide momentum
in 1997 when he began to use the Internet to publicly discuss his
"bottom-up" approach to the entire subject of PKI and Internet security,
already including some prototypes and software interfaces in Java, C
and C++ which were developed and tested in the years before.  His
current work topics include Internet voting protocols, non self-referential
identification, subjective and intersubjective logic, law and ethics in
relationship to security and privacy in intersubjective logic, quantum
cryptography, extrinsic and intrinsic certification, biometrics,
smart-cards,
X.509, PKIX, PGP, SSL, SET, DNS naming issues and methods,
meta-certificates,
Java and PHP as model languages, and the application of lasers to provide
or break security features.  His work is providing a mathematical
representation for meaning (an ad hoc assumption in Semiotics and a missing
variable in Shannon’s Information Theory) and advancing new cryptographic
systems that can use unknown-keys, not only public/private- or secret-keys.
One of the practical consequences (exemplifed by protocls called M-DES,
Less-DES and DVC) of the new cryptographic systems is that decryption by a
brute-force attacker can be penalized with a much higher workload (e.g.,
16,000x) than without it, for a given secret-key length – affording safer
use
for smaller secret-keys. This development is significant for wireless and
smart-card
applications, in addition to providing for reduced workload at client
machines.

Dr. Gerck can be reached by e-mail at [EMAIL PROTECTED] The current
PGP key is available upin request. This resume is available at
[http://www.mcg.org.br/authors/eg.htm].





Reply via email to