HOME

TheInfoList



OR:

Founded in 1990, the Information Security Group (ISG) is one of the oldest academic departments focusing on Information Security and
Cyber Security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
. It is part of the Engineering, Physical Sciences and Mathematics School (EPMS) at
Royal Holloway Royal Holloway, University of London (RH), formally incorporated as Royal Holloway and Bedford New College, is a public university, public research university and a constituent college, member institution of the federal University of London. It ...
,
University of London The University of London (UoL; abbreviated as Lond or more rarely Londin in Post-nominal letters, post-nominals) is a collegiate university, federal Public university, public research university located in London, England, United Kingdom. The ...
. It has around 25 established academic posts, 7 visiting Professors or Fellows and over 90 research students. The Founder Director of the ISG was the late Professor Fred Piper, and the current director is Professor Lizzie Coles-Kemp. Previous directors include Professors Peter Komisarczuk, Keith Martin, Keith Mayes, Chris Mitchell and Peter Wild. In 1998 the ISG was awarded a
Queen's Anniversary Prize The Queen Elizabeth Prizes for Education (formerly Queen's Anniversary Prizes) are a biennially awarded series of prizes awarded to universities and colleges in the further and higher education sectors within the United Kingdom. Uniquely it forms ...
in recognition of its work in the field of
information security Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
. It has also been awarded the status of Academic Centre of Excellence in Cyber Security Research (ACE-CSR) and hosts a Centre for Doctoral Training in cyber security. In 1992, the ISG introduced an MSc in information security, being the first university in the world to offer a postgraduate course in the subject. In 2014 this course received full certification from
GCHQ Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
. In 2017 it won the award for the ''Best Cyber Security Education Programme'' at SC Awards Europe 2017 and in 2021 it was awarded ''gold'' status by the National Cyber Security Centre (NCSC). Research topics addressed by the ISG include: the design and evaluation of cryptographic algorithms, protocols and key management;
provable security Provable security refers to any type or level of computer security that can be proved. It is used in different ways by different fields. Usually, this refers to mathematical proofs, which are common in cryptography. In such a proof, the capabilit ...
;
smart card A smart card (SC), chip card, or integrated circuit card (ICC or IC card), is a card used to control access to a resource. It is typically a plastic credit card-sized card with an Embedded system, embedded integrated circuit (IC) chip. Many smart ...
s;
RFID Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, a radio receiver, and a transmitter. When tri ...
;
electronic commerce E-commerce (electronic commerce) refers to Commerce, commercial activities including the electronic buying or selling Goods and services, products and services which are conducted on online platforms or over the Internet. E-commerce draws on tec ...
;
security management Security management is the identification of an organization's assets i.e. including people, buildings, machines, systems and information assets, followed by the development, documentation, and implementation of policies and procedures for pr ...
; mobile telecommunications security; authentication and identity management; cyber-physical systems; embedded security;
Internet of Things Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The IoT encompasse ...
(IoT); and human related aspects of cyber security. The current director of Research is Professor Stephen Wolthusen. The ISG includes the Smart Card and IoT Security Centre (previously named Smart Card Centre, SCC) that was founded in October 2002 by
Royal Holloway Royal Holloway, University of London (RH), formally incorporated as Royal Holloway and Bedford New College, is a public university, public research university and a constituent college, member institution of the federal University of London. It ...
,
Vodafone Vodafone Group Public Limited Company () is a British Multinational company, multinational telecommunications company. Its registered office and global headquarters are in Newbury, Berkshire, England. It predominantly operates Service (economic ...
and
Giesecke & Devrient Giesecke+Devrient GmbH (G+D) is a German international security technology company operating in the fields of Computer security, digital security, financial platforms, and currency technology. Founded in 1852, the company evolved from a manufactu ...
, for training and research in the field of
Smart card A smart card (SC), chip card, or integrated circuit card (ICC or IC card), is a card used to control access to a resource. It is typically a plastic credit card-sized card with an Embedded system, embedded integrated circuit (IC) chip. Many smart ...
s, applications and related technologies: its research topics include
RFID Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, a radio receiver, and a transmitter. When tri ...
,
Near Field Communication Near-field communication (NFC) is a set of communication protocols that enables communication between two electronic devices over a distance of or less. NFC offers a low-speed connection through a simple setup that can be used for the boots ...
(NFC), mobile devices, IoT, and general embedded/implementation system security. In 2008, the SCC was commissioned to perform a counter expertise review of the
OV-chipkaart The OV-chipkaart (, short for ''openbaar vervoer chipkaart'' , meaning ''public transport chipcard'') is a contactless smart card and integrated ticketing system used for all public transport in the Netherlands. First introduced in the Rotterda ...
by the
Dutch Ministry of Transport, Public Works and Water Management The Ministry of Transport, Public Works and Water Management ( Dutch: ''Ministerie van Verkeer en Waterstaat''; V&W) was a Dutch ministry responsible for water management, public and private transport and infrastructure. It is now part of the ...
. The SCC has received support from a number of industrial partners, such as Orange Labs (UK), the UK Cards Association,
Transport for London Transport for London (TfL) is a local government body responsible for most of the transport network in London, United Kingdom. TfL is the successor organization of the London Passenger Transport Board, which was established in 1933, and His ...
and ITSO. The current director of the Smart Card and IoT Security Centre is Dr. Konstantinos Markantonakis. The ISG also includes a Systems Security Research Lab (S2Lab), which was created in 2014, to investigate how to protect systems from software related threats, such as
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
and
botnet A botnet is a group of Internet-connected devices, each of which runs one or more Internet bot, bots. Botnets can be used to perform distributed denial-of-service attack, distributed denial-of-service (DDoS) attacks, steal data, send Spamming, sp ...
s. The research in the lab covers many different Computer Science-related topics, such as
operating system An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ...
s, computer architecture,
program analysis In computer science, program analysis is the process of analyzing the behavior of computer programs regarding a property such as correctness, robustness, safety and liveness. Program analysis focuses on two major areas: program optimization an ...
, and
machine learning Machine learning (ML) is a field of study in artificial intelligence concerned with the development and study of Computational statistics, statistical algorithms that can learn from data and generalise to unseen data, and thus perform Task ( ...
. Current and former associated academics include
Whitfield Diffie Bailey Whitfield 'Whit' Diffie ForMemRS (born June 5, 1944) is an American cryptographer and mathematician and one of the pioneers of public-key cryptography along with Martin Hellman and Ralph Merkle. Diffie and Hellman's 1976 paper ''New Dire ...
,
Kenny Paterson Kenneth G. "Kenny" Paterson (born 2 March 1969) is a professor in the Institute of Information Security at ETH Zurich, where he leads the Applied Cryptography Group. Before joining ETH Zurich in April 2019, he was a professor in the Information Se ...
,
David Naccache David Naccache is a cryptographer, currently a professor at the École normale supérieure and a member of its Computer Laboratory. He was previously a professor at Panthéon-Assas University. Biography He received his Ph.D. in 1995 from the ...
, Matt Robshaw, Michael Walker, Sean Murphy and
Igor Muttik Igor Muttik (born 1962 in Russia) is a computer security expert, researcher and inventor. Career Igor Muttik is a Senior Principal Research Architect with McAfee which is part of Intel Corporation since 2011. He started researching computer malwa ...
. Royal Holloway's Information Security Group has been mentioned in popular media, most notably in the ''New York Times'' bestseller ''
The Da Vinci Code ''The Da Vinci Code'' is a 2003 mystery thriller novel by Dan Brown. It is “the best-selling American novel of all time.” Brown's second novel to include the character Robert Langdon—the first was his 2000 novel '' Angels & Demons''� ...
'' by
Dan Brown Daniel Gerhard Brown (born June 22, 1964) is an American author best known for his Thriller (genre), thriller novels, including the Robert Langdon (book series), Robert Langdon novels ''Angels & Demons'' (2000), ''The Da Vinci Code'' (2003), '' ...
.


References


External links


Information Security Group website

Smart Card Centre website

Systems Security Research Lab website

Royal Holloway, University of London website
{{Authority control Royal Holloway, University of London