Prof Britta hale
photo by Julie Gloppe Solem

Britta Hale

Assistant Professor
Department of Computer Science—Naval Postgraduate School

Department of Computer Science
Code CS Naval Postgraduate School
Monterey, California 93943
britta (dot) hale (at) nps (dot) edu
Tlf: +1 831 656 3316
Office: GE332

Research Interests
  • Theoretical and Applied Cryptography
  • Mathematics of Communications
  • Hybrid Post-Quantum Security
  • Security "Healing" and Post Key-Compromise Guarantees
  • Multi-party Key Exchange (part of the IETF MLS standardization effort)

POC for the NPS Applied Cryptography Engineering (ACE) Lab

  • PhD in Telematics, Research field: Cryptography
    Norwegian University of Science and Technology (NTNU), Trondheim, Norway
    Dissertation: Low-Latency Key Exchange and Secure Channels
    Research Fellow

  • Masters of Science in the Mathematics of Cryptography and Communications
    Royal Holloway University of London, UK
    Dissertation: Digital Signatures in Network Coding: Linear Subspaces and Bilinear Pairing Stratagems
    Degree Awarded With Distinction
    International Excellence Scholarship

Selected Publications
  • B. Dowling and B. Hale. There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging. In IACR ePrint. 2020.
  • N. Papakonstantinou, D. J. Van Bossuyt, J. Linnosmaa, B. Hale, B. O’Halloran. Towards a Zero Trust Hybrid Security and Safety Risk Analysis Method. In Proceedings of the ASME 2020 IDETC/CIE2020.
  • B. Hale. User-Mediated Authentication Protocols and Unforgeability in Key Collision. International Journal of Information Security (IJIS), 2020.
  • C. Cremers, B. Hale, K. Kohbrok. Revisiting Post-Compromise Security Guarantees in Group Messaging. IACR Cryptology ePrint 2019.
  • B. Hale. User-Mediated Authentication Protocols and Unforgeability in Key Collision. In Proc. ProvSec 2018.
  • C. Boyd, B. Hale. Secure Channels and Termination: The Last Word on TLS. In Proc. Latincrypt 2017. Lecture Notes in Computer Science, vol 11368. Springer.
  • B. Hale. Expanding ACCE: Robust Secure Channel Establishment. In Proc. NISK 2017.
  • C. Rikardsen, B. Hale, and S.F. Mjølsnes. User Understanding and Perspectives on End-to-End Encrypted Instant Messaging Apps. In Proc. NISK 2017.
  • F. Günther, B. Hale, T. Jager, and S. Lauer. 0-RTT Key Exchange with Full Forward Secrecy. In Proc. EUROCRYPT’17, volume 10212 of Lecture Notes in Computer Science, 2017.
  • B. Hale, T. Jager, S. Lauer, and J. Schwenk. Simple Security Definitions for and Constructions of 0-RTT Key Exchange. In Proc. Applied Cryptography and Network Security (ACNS) 2017. Lecture Notes in Computer Science, vol 10355. Springer, 2017.
  • C. Boyd, B. Hale, S.F. Mjølsnes and D. Stebila. From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. In Proc. RSA Conference on Topics of Cryptology (CT-RSA) 2016 volume 9610 pages 55–71. Springer, 2016.
  • B. Hale, C. Carr, and D. Gligoroski. CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control. In MyCrypt 2016.
  • B. Hale and C. Boyd. Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. In Proc. SSR’14, volume 8893 of Lecture Notes in Computer Science, pages 236–255. Springer-Verlag, 2016.

Selected Invited Talks
  • Asynchronous Group Messaging Security. Industry Network Technology Council Webinar, 2020.
  • PSKs and Their Use in MLS. IETF MLS Working Group, 2020.
  • The Reality of Secure Messaging: Users, Entity Authentication, and a World after Compromise. Stanford, 2019.
  • User authentication within groups. IETF-105, Montréal, Canada, 2019.
  • People! Protocol analysis to include the weakest link. MSR, Redmond, Washington, USA, 2019.
  • Customizing Public Key Encryption: Thinking beyond PKI. NPS, Monterey, California, USA, 2019.
  • Regaining a Competitive Edge in Cyber Security. Big Ideas Exchange, Monterey, California, USA, 2018.
  • Cryptography in a Brave New World. NPS, Monterey, California, USA, 2018.
  • Frustrasjoner og løsninger om sakte sikkerhetsoppsett [Ultra-Efficiency with Security]. SINTEF Ledersamling, Trondheim, Norway, 2018.
  • Sikkerhet i en digital verden med hackere hakk i hæl [Security in a Digital World with Hackers at the Heels]. Forsker Grand Prix, Trondheim, Norway, 2017.
  • Secure Channels. TLS 1.3: Design, Implementation & Verification Workshop, Paris, France, 2017.
  • Deep Web and Dark Web. Samfundsmøte, Trondheim, Norway, 2017.
  • The Signal Protocol. CryptoParties, Trondheim, Norway, 2017.
  • Secure Channels and Termination: The Last Word on TLS. Bertinoro, Italy, 2017.
  • A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS TU Darmstadt, Germany, 2016.
  • A Perfect Memory: Key Compromise in an Efficiency-centric World . Crypto vs. Mass Surveillance Workshop, Trondheim, Norway, 2016.
  • Implications between Authentication Levels and Secure Termination. CryptoAction Working Group 2 Protocol Analysis, Sofia, Bulgaria, 2015.

Program Committees and other Review Activities
  • Journal of Cryptology 2020
  • HICSS Cyber Systems Minitrack 2020
  • Theory of Cryptography Conference 2020
  • Journal of Cryptology 2019
  • Security and Standardization Research (SSR) 2019
  • Security and Standardization Research (SSR) 2018
  • Eurocrypt 2016
  • IEEE TDSC Journal SI 2016
  • PASSWORDS 2015

Selected Research Visits
  • University of California, Berkeley, U.S.
  • Microsoft Research (MSR), Washington, U.S.
  • CISPA Helmholtz Center for Information Security, Germany
  • University of Oxford, UK
  • Technische Universität Darmstadt, Germany
  • Ruhr-Universität Bochum, Germany

Selected Supervised Master Projects and Theses
  • LCDR Boswyck Offord II and LT Allen Golphin III — Counter-Unmanned Aerial Systems (CUAS) Interoperability in the Global Geopolitical Environment
  • Maj Thomas Schindler — Identification, Analysis, and Simulation of Attacks Using Recovered Radio Network Temporary Identifiers on 5G User Equipment
  • LT Fritz Hain — Adaptive Machine Learning-Based Steganographic Model for Subverting Censorship
  • Capt Steven Gore — Security of Federated Learning on IoT Systems
  • GySgt John Lytle — Performance of Hybrid Signature Generation and Verification for Public Key Infrastructure Certificates
  • Maj Raymond Takor — Secure Chat for Military C2
  • LT Duc Nguyen — Hardening Automated Identification Systems: Providing Integrity Through An Application of Lightweight Cryptographic Techniques
  • Capt Michael Troncoso (2020) — A Cryptographic Analysis of Bluetooth's Human-Machine Authenticated Key Exchange Protocols
  • Aaron Daponte, Gregory Maguire, and Calvin Roldan (2020) — Unmanned Aerial System Risk Management Decision Matrix
  • LT Michael Sjoholmsierchio (2019) — Software-Defined Networks: Protocol Dialects
  • Charlotte Rikardsen (2017) — Secure Instant Messaging End-to-End - Analysis of Security Protocols
  • Eirik Klevstad (2016) — Security and Key Establishment in IEEE 802.15.4
  • Øystein Løvdal Andersen (2016) — Security of Internet of Things Protocol Stacks
  • Jonas Toreskås (2016) — Secure Termination in Real-World Security Protocols
  • Mari Bergendahl (2016) — The Cost of Crypt-by-Default in IoT Master Project
  • Kristian Weium Lange (2015) — Enhanced Privacy ID for Authentication in the Internet of Things
  • Steffen Fredrik Birkeland and Jonathan Hansen (2015) — Android App Communication Using the Tor network only
  • Henriette Chiem (2015) — Security of Domestic Products in the IoT
  • Christian A. Hansen and Håkon Nymo (2014) — Matland Security of Mobile Payments using Low Energy Bluetooth

Selected Radio / TV / News
  • Sikkerhet i en digital verden med hackere hakk i hæl [Security in a Digital World with Hackers at the Heels] Forsker Grand Prix, Trondheim, Norway, 2017
  • Deep Web and Dark Web Samfundsmøte, Trondheim, Norway, 2017
  • Sintef-forsker: – 2020 er ikke dommedag for kryptografi [SINTEF Researcher: 2020 is not Doomsday for Cryptography] Digi.no 2018 (behind a paywall)

Selected Blog Entries