loader from loading.io

93. Joshua Brandon Holden, Math Professor and Author of The Mathematics of Secrets

The 92 Report

Release Date: 04/15/2024

95. William Cheng, Hospitalist and Singer show art 95. William Cheng, Hospitalist and Singer

The 92 Report

William Cheng has been working in the Silicon Valley area since 2000. He graduated from Harvard as a bio concentrator and later attended UCLA's David Geffen School of Medicine. He completed residency training in internal medicine at Santa Clara Valley Medical Center, a county hospital affiliated with Stanford Hospital System. He then joined the Palo Alto Medical Foundation as a hospitalist, focusing on acutely ill patients. Working as a Hospitalist William's understanding of the world has changed over the two decades as a hospitalist. He now understands the importance of non-hard science...

info_outline
94. Jeanne Simpson, Actor/Dancer/Choreographer/Director/Teacher show art 94. Jeanne Simpson, Actor/Dancer/Choreographer/Director/Teacher

The 92 Report

Jeanne Simpson moved to New York after graduating. She started doing day jobs in New York City to make ends meet while attending free dance classes, which allowed her to continue her training without having to pay for grad school. She eventually joined the American Isadora Dance Company, a modern company. Beginning a Career in the Performing Arts Jeanne began her acting career at HB Studios, where she was given a scholarship and studied under Austin Pendleton, a talented teacher who taught the advanced Acting Program at HB. She worked with other amazing actors and learned to choreograph scenes...

info_outline
93. Joshua Brandon Holden, Math Professor and Author of The Mathematics of Secrets show art 93. Joshua Brandon Holden, Math Professor and Author of The Mathematics of Secrets

The 92 Report

Joshua Brandon Holden, the author of The Mathematics of Secrets, Cryptography from Caesar Ciphers to Digital Encryption, graduated with a degree in pure math and went on to teach at the University of Massachusetts and Duke. He discovered that he was spending most of his time on teaching, so he sought jobs where they would reward teaching. He then worked at the Rose Hulman Institute of Technology, where he did both teaching and research.  Common Misconceptions about Cryptography Joshua discusses common misconceptions about cryptography and its connection to the internet. He explains that...

info_outline
92. Mark Jacobstein, Accidental Entrepreneur show art 92. Mark Jacobstein, Accidental Entrepreneur

The 92 Report

Mark Jacobstein resides in Stanford, California with his wife, two children, and his mother in law. Mark's career has primarily focused on entrepreneurial technology, primarily in health tech, biotech, molecular diagnostics, and digital health arenas. After Cambridge, he worked with Scott Murphy, a close friend and business partner. He moved to California in 2003 to start a technology company and has been there ever since. He lives on the Stanford campus, which allows his children to grow up on a college campus.  Founding a Fantasy Sports Business Mark shares his journey from writing...

info_outline
91. Andreas Stavropoulos, Entering the Third Act show art 91. Andreas Stavropoulos, Entering the Third Act

The 92 Report

Andreas Stavropoulos, a venture capitalist and entrepreneur, came to the United States from Greece at 18 and has been in the United States ever since. His big moves include marrying his high school sweetheart, arranging their lives around graduate school, medical school, business school, and moving to California. He is now 55-years-old and is excited about the third act of his life, where he can choose where to spend his time more than he used to. A Career as a Venture Capitalist Andreas started his career as a venture capitalist in 1999 and has been doing so for over two and a half years. He...

info_outline
90. Shannon Frison, Marine and Judge show art 90. Shannon Frison, Marine and Judge

The 92 Report

Show Notes: Shannon Frison joined the United States Marine Corps during her time in law school. She spent her second year at officer candidate school and became commissioned as an officer. After law school, she returned to Massachusetts, worked for a year at the TAs office, took the bar, and went on active duty with the Marine Corps. After serving at Marine Corps Air Station, New River, North Carolina, she worked for a litigation firm called Dwyer and Clora before opening a law firm. In 2009, she applied for the bench in Massachusetts and was appointed to the Boston Municipal Court. She then...

info_outline
89. Anastasia Fernands, Patent Litigator show art 89. Anastasia Fernands, Patent Litigator

The 92 Report

Show Notes: Anastasia Fernands has been practicing law since graduating from NYU. She started practicing in Boston at Hutchins, Wheeler and Dittmar, which was the oldest continuously running firm in Boston at the time. Anastasia has since moved to New York and now practices at Quinn Emanuel. Anastasia’s career primarily focuses on intellectual property litigation, particularly patent litigation since the mid to late 90s. At that time there were two schools of thought on patent litigation: technical people who understood technology and those who were litigators by trade. There was a...

info_outline
88. Brett Janis, Principal at Strong Bridge Advisers show art 88. Brett Janis, Principal at Strong Bridge Advisers

The 92 Report

After Brett Janis left Harvard, he worked as a journalist in Southeast Asia and later attended Georgetown University's Masters of Science and Foreign Service program, which introduced him to the International Affairs world. After a stint in Egypt, Brett joined the Central Intelligence Agency (CIA) in 1995, where he focused on economic issues related to the Southeast Asia crisis, including issues related to banks and financial markets. He left the CIA just before 9/11, which was a critical moment in his life. He went back to Asia and started a business which dealt with finances for family...

info_outline
87. Richard Primus, Constitutional Law Professor show art 87. Richard Primus, Constitutional Law Professor

The 92 Report

Show Notes: Richard Primus initially had no idea what he wanted to do professionally after graduation, but eventually realized that he wanted to be a professor with interests in both law and political theory. He took HW Perry's constitutional interpretation class and decided to pursue graduate school and political theory before going to law school. Richard decided to study political theory at Oxford with the idea of becoming a law professor. He found his studies there focused on the abstract nature of political theory at the time, which required abstract questions about justice, liberty, and...

info_outline
86. Chris Ball,  Research Scientist in the ElectroScience Laboratory show art 86. Chris Ball,  Research Scientist in the ElectroScience Laboratory

The 92 Report

Show Notes: After graduation, Chris Ball spent his summer working in Cambridge before returning to Columbus, Ohio, where he began graduate school in physics at The Ohio State University. He worked with Professor Frank DeLuca, a world-renowned researcher in microwave spectroscopy. Chris’ research focused on the microwave absorption of sulfur dioxide and its relationship to NASA's Microwave Limb Sounder instrument. Studying Interstellar Bands During his time at OSU, Chris collaborated with Professor Patrick Thaddeus from the Harvard Smithsonian Center for Astrophysics, who was looking to hire...

info_outline
 
More Episodes

Joshua Brandon Holden, the author of The Mathematics of Secrets, Cryptography from Caesar Ciphers to Digital Encryption, graduated with a degree in pure math and went on to teach at the University of Massachusetts and Duke. He discovered that he was spending most of his time on teaching, so he sought jobs where they would reward teaching. He then worked at the Rose Hulman Institute of Technology, where he did both teaching and research. 

Common Misconceptions about Cryptography

Joshua discusses common misconceptions about cryptography and its connection to the internet. He explains that people often knew about cryptography in ancient times but don't know about the throughline. Older theories of cryptography were implicitly mathematical but not explicitly, while new theories are very explicitly mathematical. Joshua aims to open up the connection between older forms of cryptography and the new ones, stating that everyone has some ability to do all of it in varying amounts. He talks about the current state of cryptography online, including public key cryptography, which originated in the 70s and gained popularity in the 90s with internet commerce. Public key cryptography allows users to send secret messages through a one-way key, which is only decrypted by the sender who has a different key. This is important for sending credit card information to companies like Amazon or Walmart. However, end-to-end encryption means middlemen are no longer able to decrypt messages, so it's crucial to look carefully at providers' policies to determine if they stay in the loop. Joshua talks about the networks and relationships within the cryptography field, including the opportunities for professionals to work in private camps, government agencies, and academia. He notes that while there is money and space in the field, there is also a lot of space for professionals to stay updated on the latest theories and developments.

Quantum Computers in Cryptography

The conversation turns to the potential of quantum computers in cryptography and the potential for breaking encryption systems. He believes that quantum computers are expected to be better at breaking the problems used in creating mathematical problems used in special public key systems, such as encryption used by browsers to protect credit card information and communications. He also discusses the development of quantum resistant cryptography, which is a more complex system but the basic principles of quantum resistance systems are still relatively graspable for anyone with high school algebra and a willingness to dig deep. By applying enough computing power to end-to-end encryption systems, it is possible to break them. The only way to achieve perfect secrecy is to have a secret key, which is as long as the conversation. This method was supposedly used for the famous red phone between the White House and the Kremlin during the Cold War.

Keeping Your Data Safe

In terms of security, Joshua advises people to know their threat model and consider the potential threats they face. Some people may worry about powerful governments trying to break their communications, while others may be concerned about corporate spies, children, or random people passing by. For those worried about corporate espionage, it is recommended to look for end-to-end encryption systems. While quantum computers may not be easy to break, they do not guarantee that someone can’t break the system with enough computing power.

Class Field Towers Explained

Joshua talks about his research in the field of mathematics, specifically in the area of class field towers. He explains why imaginary numbers are not square roots but rather arbitrary choices. He also discusses the concept of Galois groups, which track the number of ways complex numbers can be shuffled around without making a difference. He explains that class field towers consist of rational numbers, real numbers with irrational decimals, and complex numbers on top of them. These towers record the complexity of each jump made in the tower. 

Joshua talks about the role of computers in mathematical research, stating that there is more computer usage in this area due to improved software tools and more applications in cryptography. He identifies two traits that are most useful for being successful in mathematical research: perseverance and curiosity. Perseverance is the reason most people persist. In graduate school or postgraduate school, those who stick with their passion and interest in math may be more likely to succeed in mathematical research. He encourages students to not give up on problems that require a different kind of math, even if it's not necessary for their career. He believes that having a sense of curiosity about everything comes from the fact that in mathematics, all one needs is to  just think hard about things and talk to others. This gives one a sense of confidence that they can figure things out without the need for special abilities or tools.

Influential Harvard Professors and Courses

Joshua mentions Math 25, an honors calculus course. He also enjoyed Professor McConnell, who he still maintains a friendship with. He also shares his experience with changing his name, which was the first of his non-professional wanderings. 

Timestamps:

04:33 Cryptography and its applications in online security

11:57 Cryptography, public key systems, and quantum computing

21:07 Encryption, mathematics, and data security

27:49 Mathematical research and talent

33:41 Math education, career choices, and personal growth

Links:

Website: https://wordpress.rose-hulman.edu/holden/the-mathematics-of-secrets/