TY - JOUR
T1 - Delay Measurement of 0-RTT Transport Layer Security (TLS) Handshake Protocol
AU - Hachem, Joel
AU - Goncharskyi, Danylo
AU - Kim, Sung Yong
AU - Serhrouchni, Ahmed
AU - Gu, Pengwenlong
AU - Khatoun, Rida
N1 - Transport Layer Security (TLS) 1.3 was normalised in 2018, in which an efficient 0-rtt handshake protocol was proposed. For future 5G networks, the 0-RTT handshake will be a more suitable choice for both secrecy and efficiency.
PY - 2022/5
Y1 - 2022/5
N2 - Transport Layer Security (TLS) 1.3 was normalised in 2018, in which an efficient 0-rtt handshake protocol was proposed. For future 5G networks, the 0-RTT handshake will be a more suitable choice for both secrecy and efficiency. However, 4 years after it was proposed, the 0-rtt handshake protocol is still not widely accepted by network service providers due to concerns about its ability to resist replay attacks. In order to address this issue, many solutions have be proposed in the past few year but all of them will increase the complexity and overhead of the 0-RTT protocol. In this paper, we focus on testing whether the 0-RTT handshake protocol is supported by service providers, and testing its performance in a real network environment to verify whether it can withstand continuous optimization in terms of security. Test results show that with 0-RTT, the server received the first application data up to 37 time faster than the 1-RTT and up to 83 time faster than 2-RTT. However, at the client side, the performance of 0-RTT protocol is virtually the same as 1-RTT, as predicted.
AB - Transport Layer Security (TLS) 1.3 was normalised in 2018, in which an efficient 0-rtt handshake protocol was proposed. For future 5G networks, the 0-RTT handshake will be a more suitable choice for both secrecy and efficiency. However, 4 years after it was proposed, the 0-rtt handshake protocol is still not widely accepted by network service providers due to concerns about its ability to resist replay attacks. In order to address this issue, many solutions have be proposed in the past few year but all of them will increase the complexity and overhead of the 0-RTT protocol. In this paper, we focus on testing whether the 0-RTT handshake protocol is supported by service providers, and testing its performance in a real network environment to verify whether it can withstand continuous optimization in terms of security. Test results show that with 0-RTT, the server received the first application data up to 37 time faster than the 1-RTT and up to 83 time faster than 2-RTT. However, at the client side, the performance of 0-RTT protocol is virtually the same as 1-RTT, as predicted.
UR - https://ieeexplore.ieee.org/document/9803984
U2 - 10.1109/CoDIT55151.2022.9803984
DO - 10.1109/CoDIT55151.2022.9803984
M3 - Article
JO - 2022 8th International Conference on Control, Decision and Information Technologies (CoDIT)
JF - 2022 8th International Conference on Control, Decision and Information Technologies (CoDIT)
ER -