{"title":"Proposal of secure remote access using encryption","authors":"T. Kawase, A. Watanabe, I. Sasase","doi":"10.1109/GLOCOM.1998.776856","DOIUrl":null,"url":null,"abstract":"On a remote access environment, strong authentication of the remote user is required since the danger of stealing of authentication devices is very high. We propose a secure remote access system appropriate for the remote access environment. Two authentication schemes are used to reduce the danger of stealing of authentication devices. One is the authentication using the public key cryptography. The public key cryptography is stored in the IC card of the remote user and the IC card is locked by the PIN. The other scheme is the one-time pattern authentication which is a sort of challenge and response. Simultaneously, simple key delivery is performed with these authentication protocol. An evaluation of our proposed scheme proves the feasibility and the efficiency as compared with the conventional system using the on-time password and Diffie-Hellman (1976) key agreement protocol.","PeriodicalId":414137,"journal":{"name":"IEEE GLOBECOM 1998 (Cat. NO. 98CH36250)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE GLOBECOM 1998 (Cat. NO. 98CH36250)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOM.1998.776856","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
On a remote access environment, strong authentication of the remote user is required since the danger of stealing of authentication devices is very high. We propose a secure remote access system appropriate for the remote access environment. Two authentication schemes are used to reduce the danger of stealing of authentication devices. One is the authentication using the public key cryptography. The public key cryptography is stored in the IC card of the remote user and the IC card is locked by the PIN. The other scheme is the one-time pattern authentication which is a sort of challenge and response. Simultaneously, simple key delivery is performed with these authentication protocol. An evaluation of our proposed scheme proves the feasibility and the efficiency as compared with the conventional system using the on-time password and Diffie-Hellman (1976) key agreement protocol.