Proposal of secure remote access using encryption

Tetsuya Kawase, Akira Watanabe, Iwao Sasase

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Citations (Scopus)

Abstract

On a remote access environment, strong authentication of the remote user is required since the danger of stealing of authentication devices is very high. In this paper, we propose a secure remote access system appropriate for the remote access environment. Two authentication schemes are used to reduce the danger of stealing of authentication devices. One is the authentication using the public key cryptography. The public key cryptography is stored in the IC card of the remote user and the IC card is locked by the PIN. The another scheme is the one-time pattern authentication which is a sort of challenge and response. Simultaneously, simple key delivery is performed with these authentication protocol. An evaluation of our proposed scheme proves the feasibility and the efficiency as compared with the conventional system using the one-time password and Diffie-Hellman key agreement protocol.

Original languageEnglish
Title of host publicationConference Record / IEEE Global Telecommunications Conference
PublisherIEEE
Pages868-873
Number of pages6
Volume2
Publication statusPublished - 1998
EventProceedings of the IEEE GLOBECOM 1998 - The Bridge to the Global Integration - Sydney, NSW, Aust
Duration: 1998 Nov 81998 Nov 12

Other

OtherProceedings of the IEEE GLOBECOM 1998 - The Bridge to the Global Integration
CitySydney, NSW, Aust
Period98/11/898/11/12

Fingerprint

Authentication
Cryptography
Public key cryptography
public
protocol
evaluation

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Global and Planetary Change

Cite this

Kawase, T., Watanabe, A., & Sasase, I. (1998). Proposal of secure remote access using encryption. In Conference Record / IEEE Global Telecommunications Conference (Vol. 2, pp. 868-873). IEEE.

Proposal of secure remote access using encryption. / Kawase, Tetsuya; Watanabe, Akira; Sasase, Iwao.

Conference Record / IEEE Global Telecommunications Conference. Vol. 2 IEEE, 1998. p. 868-873.

Research output: Chapter in Book/Report/Conference proceedingChapter

Kawase, T, Watanabe, A & Sasase, I 1998, Proposal of secure remote access using encryption. in Conference Record / IEEE Global Telecommunications Conference. vol. 2, IEEE, pp. 868-873, Proceedings of the IEEE GLOBECOM 1998 - The Bridge to the Global Integration, Sydney, NSW, Aust, 98/11/8.
Kawase T, Watanabe A, Sasase I. Proposal of secure remote access using encryption. In Conference Record / IEEE Global Telecommunications Conference. Vol. 2. IEEE. 1998. p. 868-873
Kawase, Tetsuya ; Watanabe, Akira ; Sasase, Iwao. / Proposal of secure remote access using encryption. Conference Record / IEEE Global Telecommunications Conference. Vol. 2 IEEE, 1998. pp. 868-873
@inbook{f9c7a9ac00a14192a9e6a5574aad9efd,
title = "Proposal of secure remote access using encryption",
abstract = "On a remote access environment, strong authentication of the remote user is required since the danger of stealing of authentication devices is very high. In this paper, we propose a secure remote access system appropriate for the remote access environment. Two authentication schemes are used to reduce the danger of stealing of authentication devices. One is the authentication using the public key cryptography. The public key cryptography is stored in the IC card of the remote user and the IC card is locked by the PIN. The another scheme is the one-time pattern authentication which is a sort of challenge and response. Simultaneously, simple key delivery is performed with these authentication protocol. An evaluation of our proposed scheme proves the feasibility and the efficiency as compared with the conventional system using the one-time password and Diffie-Hellman key agreement protocol.",
author = "Tetsuya Kawase and Akira Watanabe and Iwao Sasase",
year = "1998",
language = "English",
volume = "2",
pages = "868--873",
booktitle = "Conference Record / IEEE Global Telecommunications Conference",
publisher = "IEEE",

}

TY - CHAP

T1 - Proposal of secure remote access using encryption

AU - Kawase, Tetsuya

AU - Watanabe, Akira

AU - Sasase, Iwao

PY - 1998

Y1 - 1998

N2 - On a remote access environment, strong authentication of the remote user is required since the danger of stealing of authentication devices is very high. In this paper, we propose a secure remote access system appropriate for the remote access environment. Two authentication schemes are used to reduce the danger of stealing of authentication devices. One is the authentication using the public key cryptography. The public key cryptography is stored in the IC card of the remote user and the IC card is locked by the PIN. The another scheme is the one-time pattern authentication which is a sort of challenge and response. Simultaneously, simple key delivery is performed with these authentication protocol. An evaluation of our proposed scheme proves the feasibility and the efficiency as compared with the conventional system using the one-time password and Diffie-Hellman key agreement protocol.

AB - On a remote access environment, strong authentication of the remote user is required since the danger of stealing of authentication devices is very high. In this paper, we propose a secure remote access system appropriate for the remote access environment. Two authentication schemes are used to reduce the danger of stealing of authentication devices. One is the authentication using the public key cryptography. The public key cryptography is stored in the IC card of the remote user and the IC card is locked by the PIN. The another scheme is the one-time pattern authentication which is a sort of challenge and response. Simultaneously, simple key delivery is performed with these authentication protocol. An evaluation of our proposed scheme proves the feasibility and the efficiency as compared with the conventional system using the one-time password and Diffie-Hellman key agreement protocol.

UR - http://www.scopus.com/inward/record.url?scp=0032260880&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0032260880&partnerID=8YFLogxK

M3 - Chapter

AN - SCOPUS:0032260880

VL - 2

SP - 868

EP - 873

BT - Conference Record / IEEE Global Telecommunications Conference

PB - IEEE

ER -