A Key Distribution and Authentication Scheme based on X . 25 Protocol 


Vol. 4,  No. 12, pp. 3078-3087, Dec.  1997
10.3745/KIPSTE.1997.4.12.3078


PDF
  Abstract

The information security is very important in computer communication network, and the security system has been developed in many aspects to provide secure communication. The secret key distribution and mutual user authentication are essential element in designing security system, then many algorithms and implementation schemes have been proposed. But they don't consider communication protocol, so they are not easy to adapt a real communication networks. In this paper, we propose a key distribution and mutual user authentication scheme based on X.25 protocol which is the most popular in packet communication, and the proposed scheme maintains a protocol transparency and can select communication mode, so the security system is more capable.

  Statistics


  Cite this article

[IEEE Style]

S. K. Wook, P. E. Ki, L. J. Seok, S. K. Soo, "A Key Distribution and Authentication Scheme based on X . 25 Protocol," The Transactions of the Korea Information Processing Society (1994 ~ 2000), vol. 4, no. 12, pp. 3078-3087, 1997. DOI: 10.3745/KIPSTE.1997.4.12.3078.

[ACM Style]

Sohn Ki Wook, Park Eung Ki, Lee Jin Seok, and Shin Ki Soo. 1997. A Key Distribution and Authentication Scheme based on X . 25 Protocol. The Transactions of the Korea Information Processing Society (1994 ~ 2000), 4, 12, (1997), 3078-3087. DOI: 10.3745/KIPSTE.1997.4.12.3078.