A Key Distribution and Authentication Scheme based on X . 25 Protocol


The Transactions of the Korea Information Processing Society (1994 ~ 2000), Vol. 4, No. 12, pp. 3078-3087, Dec. 1997
10.3745/KIPSTE.1997.4.12.3078,   PDF Download:

Abstract

The information security is very important in computer communication network, and the security system has been developed in many aspects to provide secure communication. The secret key distribution and mutual user authentication are essential element in designing security system, then many algorithms and implementation schemes have been proposed. But they don't consider communication protocol, so they are not easy to adapt a real communication networks. In this paper, we propose a key distribution and mutual user authentication scheme based on X.25 protocol which is the most popular in packet communication, and the proposed scheme maintains a protocol transparency and can select communication mode, so the security system is more capable.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. K. Wook, P. E. Ki, L. J. Seok, S. K. Soo, "A Key Distribution and Authentication Scheme based on X . 25 Protocol," The Transactions of the Korea Information Processing Society (1994 ~ 2000), vol. 4, no. 12, pp. 3078-3087, 1997. DOI: 10.3745/KIPSTE.1997.4.12.3078.

[ACM Style]
Sohn Ki Wook, Park Eung Ki, Lee Jin Seok, and Shin Ki Soo. 1997. A Key Distribution and Authentication Scheme based on X . 25 Protocol. The Transactions of the Korea Information Processing Society (1994 ~ 2000), 4, 12, (1997), 3078-3087. DOI: 10.3745/KIPSTE.1997.4.12.3078.