Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Richard Edward Lennon.
IEEE Transactions on Communications | 1981
Richard Edward Lennon; S. Matyas; C. Meyer
With any strong cryptographic algorithm, such as the data encryption standard (DES), it is possible to devise protocols for authentication. One technique, which allows arbitrary, time-invariant quantities (such as encrypted keys and passwords) to be authenticated, is based upon a secret cryptographic (master) key residing in a host processor. Each quantity to be authenticated has a corresponding precomputed test pattern. At any later time, the test pattern can be used together with the quantity to be authenticated to generate a nonsecret verification pattern. The verification pattern can in turn be used as the basis for accepting or rejecting the quantity to be authenticated.
ieee symposium on security and privacy | 1981
Carl Heinz Wilhelm Meyer; Stephen M. Matyas; Richard Edward Lennon
A set of required security criteria is developed which assures that the personal verification processes at different institutions in an interchange environment are isolated from one another. It is assumed that only information stored on the bank card and information remembered by a systerm user are employed for personal verification. Under that assumption, it is shown that only through the use of a secret quantity (a personal cryptographic key) stored on the bank card will the set of required criteria be satisfied. With a personal key, the same degree of isolation can be achieved for authentication of transaction request messages sent from the entry point to the issuer. However, authentication of transaction response messages sent from the issuer to the entry point requires a system key unknoun to the user.
Data Processing | 1984
Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer
Abstract Recent reports of breaches in computer system security have created a heightened concern and interest in the vulnerability of computer systems. Cryptography is one method of combatting one problem of security. The article describes the two types of algorithm involved in cryptographic techniques.
Archive | 1987
Bruno Brachtl; Christopher J. Holloway; Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Jonathan Oseas
Archive | 1977
Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Jonathan Oseas; Paul Norman Prentice; Walter Leonard Tuchman
Archive | 1981
Robert Carl Elander; Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Robert Edward Shuck; Walter Leonard Tuchman
Archive | 1984
Bruno Brachtl; Christopher J. Holloway; Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Jonathan Oseas
Archive | 1978
Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Jonathan Oseas; Paul Norman Prentice; Walter Leonard Tuchman
Archive | 1982
Robert Carl Elander; Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Robert Edward Shuck; Walter Leonard Tuchman
Archive | 1978
William Friedrich Ehrsam; Robert Carl Elander; Lloyd Lee Hollis; Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Jonathan Oseas; Walter Leonard Tuchman