Stephen M. Matyas

Learn More
Cryptography Is considered by many users to be a complicated sUbject. An architecture for a cryptographic application programming Interface simplifies customer use of cryptographic services by helping to ensure compliance with national and International standards and by providing Intuitive high-level services that may be Implemented on a broad range of(More)
We propose a new mode of multiple encryption-triple-DES external feedback cipher block chaining with output feedback masking. The aim is to provide increased protection against certain attacks (dictionary attacks and matching ciphertext attacks) which exploit the short message-block size of DES. The new mode obtains this protection through the introduction(More)
In many applications of cryptography, assuring the authenticity of communications is as important as protecting their secrecy. A well known and secure method of providing message authentication is to compute a Message Authentication Code (MAC) by encrypting the message. If only one key is used to both encrypt and authenticate a message, however, the system(More)
LIMITED DISTRIBUTION NOTICE This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be(More)