Skip to main content

Advertisement

Log in

Network Communication Encoding: A Study for Authentication Protocols

  • Survey Article
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

The use of internet has increased significantly in the COVID-19 pandemic, and this has set the ground for various cyber-attacks, which are executed over the network during data transmission. This scenario is proven to be multifold for accessing the cloud remotely deployed in university premises. To provide secure authentication and compatibility over heterogeneous systems for cloud accessibility, every network communication applies an encoding scheme to standardize data transmission. With many wireless and ad-hoc networks where the nature of communication is difficult to monitor, the encoding scheme prevents malicious code injection during data transmission. The objective of this paper is to study encoding schemes available for data transmission and their application in terms of authentication protocols such as Kerberos and LDAP. Furthermore, it will also emphasize on the design of integration model of Kerberos and LDAP to Cloud and Shared Storage to evaluate the impact of ASN.1 vulnerability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Management Information Base. Retrieved from Wikipedia, the free encyclopedia: https://en.wikipedia.org/wiki/Management_information_base (2021).

  2. ASN.1. Retrieved from Wikipedia, the free encyclopedia: https://en.wikipedia.org/wiki/ASN.1 (2021).

  3. Dubuisson O: ASN.1 communication between heterogeneous systems; 2000.

  4. Kurose JF, Ross KW. Computer networking : a top-down approach. London: Pearson Education; 2017.

    Google Scholar 

  5. Kaliski Jr BS. A layman's guide to a subset of ASN.1, BER, and DER. RSH Data Security Inc., Redwood City (1993).

  6. Microsystems, S. (n.d.). Basic encoding rules. Retrieved from Sun Microsystems: https://docs.oracle.com/cd/E19476-01/821-0510/def-basic-encoding-rules.html.

  7. X.690. Retrieved from Wikipedia, the free encyclopedia: https://en.wikipedia.org/wiki/X.690 (2021).

  8. Housley R. rfc5878. Retrieved from ietf.org: https://tools.ietf.org/html/rfc5878 (2010).

  9. Whelan E. SNMP and potential ASN.1 vulnerabilities. Retrieved from SANS: https://www.sans.org/reading-room/whitepapers/protocols/paper/912 (2003).

  10. Steiner JG, Neuman C, Schiller JI. Kerberos: an authentication service for open network systems. Retrieved from https://www3.nd.edu/~dthain/courses/cse66771/summer2014/papers/kerberos.pdf (1988).

  11. Wang C, Feng C. Security analysis and improvement for kerberos based on dynamic password and Diffie-Hellman algorithm. In: Fourth international conference on emerging intelligent data and web technologies. China: IEEE; 2013. p. 256–60.

    Chapter  Google Scholar 

  12. Kohl JT, Neuman BC, Ts’o TY. The evolution of the kerberos authentication service. In: Brazier F, Johansen D, editors. Distributed open systems. New Jersey: IEEE Computer Society Press; 1994. p. 78–95.

    Google Scholar 

  13. Bellovin SM, Merritt M, AT&T Bell Labs. Limitations of the Kerberos authentication system. [Online] https://people.eecs.berkeley.edu/~fox/summaries/glomop/kerb_limit.html.

  14. Medvinsky A. rfc2712. Retrieved from ietf: https://tools.ietf.org/html/rfc2712 (1999).

  15. SUSE SLES12 Security Update : krb5 (SUSE-SU-2020:3379–1). Tenable. [Online] 11 19, 2020.

  16. Koutsonikola V, Vakali A. LDAP: framework, practices, and trends. IEEE Internet Comput. 2004;8(5):66–72.

    Article  Google Scholar 

  17. System, Cisco. PKI data formats. https://www.cisco.com/. [Online] https://www.cisco.com/c/en/us/support/docs/security/vpn-client/116039-pki-data-formats-00.pdf.

  18. Lim SS, Choi JH, Zeilenga KD. Design and implementation of LDAP component matching for flexible and secure certificate access in PKI. In Proc. of the 4th Annual PKI R&D Workshop; 2005, p. 41–51.

  19. Sermersheim JE. rfc4511#section-4.1.11. Retrieved from ietf: https://tools.ietf.org/html/rfc4511#section-4.1.11 (2006).

  20. Hodges J, Morgan R. rfc2830. Retrieved from ietf: https://tools.ietf.org/html/rfc2830 (2000).

  21. Josefsson S. Using Kerberos version 5 over the transport layer security (TLS) protocol. Request for Comments (RFC), 6251 (2011).

  22. CVE-2020–28196. Retrieved from CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196 (2020).

  23. CVE-2020–10704. Retrieved from Samba: https://www.samba.org/samba/security/CVE-2020-10704 (2010).

  24. McCormick J. Serious Kerberos flaws affect Cisco and Mac, but not Windows. techrepublic.com. [Online] 9 14, 2004.

  25. O'Reilly. (n.d.). LDAP. Retrieved from O'Reilly home.

  26. Masud S. Kerberos-based authentication for OpenStack cloud infrastructure as a service. Texas: The University of Texas at San Antonio; 2014.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priti Kulkarni.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

“This article is part of the topical collection “Cyber Security and Privacy in Communication Networks” guest edited by Rajiv Misra, RK Shyamsunder, Alexiei Dingli, Natalie Denk, Omer Rana, Alexander Pfeiffer, Ashok Patel, and Nishtha Kesswani”.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Apte, T., Kulkarni, P. Network Communication Encoding: A Study for Authentication Protocols. SN COMPUT. SCI. 3, 152 (2022). https://doi.org/10.1007/s42979-022-01048-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-022-01048-6

Keywords