Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Walter Leonard Tuchman is active.

Publication


Featured researches published by Walter Leonard Tuchman.


Ibm Systems Journal | 1978

A cryptographic key management scheme for implementing the data encryption standard

William R. Ehrsam; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Walter Leonard Tuchman

Data being transmitted through a communications network can be protected by cryptography. In a data processing environment, cryptography is implemented by an algorithm which utilizes a secret key, or sequence of bits. Any key-controlled cryptographic algorithm, such as the Data Encryption Standard, requires a protocol for the management of its cryptographic keys. The complexity of the key management protocol ultimately depends on the level of functional capability provided by the cryptographic system. This paper discusses a possible key management scheme that provides the support necessary to protect communications between individual end users (end-to-end encryption) and that also can be used to protect data stored or transported on removable media.


IEEE Spectrum | 1979

IV. `Hellman presents no shortcut solutions to the DES¿

Walter Leonard Tuchman

Prof. Martin Hellman presents no shortcut solutions to the Data Encryption Standard; the time-memory tradeoff is just one of many key-message exhaustion techniques. Therefore when he says, ¿DES is only marginally secure today and will be totally insecure within ten years,¿ he is totally wrong.


IEEE Transactions on Electromagnetic Compatibility | 1970

Time-Notch Filtering

Albert A. Smith; Walter Leonard Tuchman

A method is described for measuring low-level time-truncated signals by using narrow-bandwidth synchronous time-notch filters. These filter systems, intended for use with ordinary narrowband receivers or field intensity meters, provide a means of isolating time-truncated signals of interest from adjacent interfering signals. In addition, the important property of near optimum sensitivity (approaching that of a matched filter) is discussed, and the laboratory results of a low-frequency time-notch filter covering the 500-Hz to 2-MHz range are given.


Archive | 1977

Cryptographic communication security for single domain networks

William Friedrich Ehrsam; Robert Carl Elander; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Robert Lowell Powers; Paul Norman Prentice; John Lynn Smith; Walter Leonard Tuchman


Archive | 1975

Product block cipher system for data security

William Friedrich Ehrsam; Carl Heinz Wilhelm Meyer; Robert Lowell Powers; John Lynn Smith; Walter Leonard Tuchman


Archive | 1977

Cryptographic verification of operational keys used in communication networks

Richard Edward Lennon; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Jonathan Oseas; Paul Norman Prentice; Walter Leonard Tuchman


Archive | 1977

Cryptographic file security for multiple domain networks

William Friedrich Ehrsam; Robert Carl Elander; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; Richard John Sahulka; Walter Leonard Tuchman


Archive | 1975

Block cipher system for data security

William Friedrich Ehrsam; Carl Heinz Wilhelm Meyer; Robert Lowell Powers; Paul Norman Prentice; John Lynn Smith; Walter Leonard Tuchman


Archive | 1977

Cryptographic file security for single domain networks

William Friedrich Ehrsam; Robert Carl Elander; Stephen M. Matyas; Carl Heinz Wilhelm Meyer; John Lynn Smith; Walter Leonard Tuchman


Archive | 1976

Message verification and transmission error detection by block chaining

William Friedrich Ehrsam; Carl Heinz Wilhelm Meyer; John Lynn Smith; Walter Leonard Tuchman

Researchain Logo
Decentralizing Knowledge