Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Richard Edward Lennon is active.

Publication


Featured researches published by Richard Edward Lennon.


IEEE Transactions on Communications | 1981

Cryptographic Authentication of Time-Invariant Quantities

Richard Edward Lennon; S. Matyas; C. Meyer

With any strong cryptographic algorithm, such as the data encryption standard (DES), it is possible to devise protocols for authentication. One technique, which allows arbitrary, time-invariant quantities (such as encrypted keys and passwords) to be authenticated, is based upon a secret cryptographic (master) key residing in a host processor. Each quantity to be authenticated has a corresponding precomputed test pattern. At any later time, the test pattern can be used together with the quantity to be authenticated to generate a nonsecret verification pattern. The verification pattern can in turn be used as the basis for accepting or rejecting the quantity to be authenticated.


ieee symposium on security and privacy | 1981

Required Cryptographic Authentication Criteria for Electronic Funds Transfer Systems

Carl Heinz Wilhelm Meyer; Stephen M. Matyas; Richard Edward Lennon

A set of required security criteria is developed which assures that the personal verification processes at different institutions in an interchange environment are isolated from one another. It is assumed that only information stored on the bank card and information remembered by a systerm user are employed for personal verification. Under that assumption, it is shown that only through the use of a secret quantity (a personal cryptographic key) stored on the bank card will the set of required criteria be satisfied. With a personal key, the same degree of isolation can be achieved for authentication of transaction request messages sent from the entry point to the issuer. However, authentication of transaction response messages sent from the issuer to the entry point requires a system key unknoun to the user.


Data Processing | 1984

Cryptography in data processing

Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer

Abstract Recent reports of breaches in computer system security have created a heightened concern and interest in the vulnerability of computer systems. Cryptography is one method of combatting one problem of security. The article describes the two types of algorithm involved in cryptographic techniques.


Archive | 1987

Transaction security system using time variant parameter

Bruno Brachtl; Christopher J. Holloway; Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Jonathan Oseas


Archive | 1977

Cryptographic verification of operational keys used in communication networks

Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Jonathan Oseas; Paul Norman Prentice; Walter Leonard Tuchman


Archive | 1981

Cryptographic application for interbank verification

Robert Carl Elander; Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Robert Edward Shuck; Walter Leonard Tuchman


Archive | 1984

Improvements in point of sale and electronic funds transfer systems

Bruno Brachtl; Christopher J. Holloway; Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Jonathan Oseas


Archive | 1978

A PROCESS FOR THE VERIFICATION OF CRYPTOGRAPHIC OPERATIONAL KEYS USED IN DATA COMMUNICATION NETWORKS

Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Jonathan Oseas; Paul Norman Prentice; Walter Leonard Tuchman


Archive | 1982

Cryptographic data communications

Robert Carl Elander; Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Robert Edward Shuck; Walter Leonard Tuchman


Archive | 1978

Multiple domain data communication

William Friedrich Ehrsam; Robert Carl Elander; Lloyd Lee Hollis; Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Jonathan Oseas; Walter Leonard Tuchman

Researchain Logo
Decentralizing Knowledge