Challenges in adapting ECH in TLS for privacy enhancement over the Internet

Show simple item record

dc.contributor.author Khandkar, Vinod S.
dc.contributor.author Hanawal, Manjesh K.
dc.contributor.author Kulkarni, Sameer G.
dc.coverage.spatial United States of America
dc.date.accessioned 2022-07-14T15:22:05Z
dc.date.available 2022-07-14T15:22:05Z
dc.date.issued 2022-07
dc.identifier.citation Khandkar, Vinod S.; Hanawal, Manjesh K. and Kulkarni, Sameer G., "Challenges in adapting ECH in TLS for privacy enhancement over the Internet", arXiv, Cornell University Library, DOI: arXiv:2207.01841, Jul. 2022. en_US
dc.identifier.uri http://arxiv.org/abs/2207.01841
dc.identifier.uri https://repository.iitgn.ac.in/handle/123456789/7893
dc.description.abstract Security and Privacy are crucial in modern Internet services. Transport Layer Security (TLS) has largely addressed the issue of security. However, information about the type of service being accessed goes in plain-text in the initial handshakes of vanilla TLS, thus potentially revealing the activity of users and compromising privacy. The "Encrypted ClientHello" or ECH overcomes this issue by extending TLS 1.3 where all of the information that can potentially reveal the service type is masked, thus addressing the privacy issues in TLS 1.3. However, we notice that Internet services tend to use different versions of TLS for application data (primary connection/channel) and supporting data (side channels) such as scheduling information \textit{etc.}. %, during the active session. Although many internet services have migrated to TLS 1.3, we notice that it is only true for the primary connections which do benefit from TLS 1.3, while the side-channels continue to use lower version of TLS (e.g., 1.2) %which do not support ECH and continue to leak type of service accessed. We demonstrate that privacy information leaked from the side-channels can be used to affect the performance on the primary channels, like blocking or throttling specific service on the internet. Our work demonstrates that adapting ECH on primary channels alone is not sufficient to prevent the privacy leaks and attacks on primary channels. Further, we demonstrate that it is necessary for all of the associated side-channels also to migrate to TLS 1.3 and adapt ECH extension in order to offer complete privacy preservatio
dc.description.statementofresponsibility by Vinod S. Khandkar, Manjesh K. Hanawal and Sameer G. Kulkarni
dc.language.iso en_US en_US
dc.publisher Cornell University Library en_US
dc.subject Security en_US
dc.subject Privacy en_US
dc.subject Transport Layer Security en_US
dc.subject Encrypted ClinetHello en_US
dc.subject Side channels en_US
dc.title Challenges in adapting ECH in TLS for privacy enhancement over the Internet en_US
dc.type Pre-Print en_US
dc.relation.journal arXiv


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Digital Repository


Browse

My Account