2021
DOI: 10.1007/s00145-021-09385-0
|View full text |Cite
|
Sign up to set email alerts
|

Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT

Abstract: The TLS 1.3 0-RTT mode enables a client reconnecting to a server to send encrypted application-layer data in “0-RTT” (“zero round-trip time”), without the need for a prior interactive handshake. This fundamentally requires the server to reconstruct the previous session’s encryption secrets upon receipt of the client’s first message. The standard techniques to achieve this are session caches or, alternatively, session tickets. The former provides forward security and resistance against replay attacks, but requi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 43 publications
0
12
0
Order By: Relevance
“…The use of 0-RTT obviates the need of performing a challenge for every re-authentication through the use of a resumption secret r s , thus reducing latency. Another strong motivation for using this mechanism is that it is forward secure in the scenario we are using here [24]. We first briefly describe the TLS 0-RTT mechanism before describing a similarly inspired 0-RTT mechanism applied to the information reconciliation phase of our SKG mechanism.…”
Section: Resumption Protocolmentioning
confidence: 99%
See 3 more Smart Citations
“…The use of 0-RTT obviates the need of performing a challenge for every re-authentication through the use of a resumption secret r s , thus reducing latency. Another strong motivation for using this mechanism is that it is forward secure in the scenario we are using here [24]. We first briefly describe the TLS 0-RTT mechanism before describing a similarly inspired 0-RTT mechanism applied to the information reconciliation phase of our SKG mechanism.…”
Section: Resumption Protocolmentioning
confidence: 99%
“…When a client tries to reconnect to that server it includes its look-up identifier k l in the 0-RTT message, which allows the server to retrieve the resumption secret r s . Storing a unique resumption secret r s for each client requires server storage for each client but it provides forward security and resilience against replay attacks, when combined with a key generation mechanisms such as Diffie Hellman (or the SKG used in this paper) which are important goals for security protocols [24]. In our physical layer 0-RTT, given that a node identifier state would be required for linklayer purposes, the session cache places little comparative load and thus is the mechanism proposed here for (re-)authentication.…”
Section: Resumption Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…Such compression operations are at the heart of common hash functions like SHA256 and SHA512 [9], and are routinely assumed to behave pseudo-randomly. 2 The EtS construction of [10] starts with splitting the message input and optional associated-data input into sequences of blocks (m i ) and (ad i ). It then iteratively computes the MD hash value of these blocks, 3 where all message carrying parts are additionally protected by XORing the EtS key into the corresponding compression function input.…”
Section: Introductionmentioning
confidence: 99%