SlideShare una empresa de Scribd logo
1 de 39
Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Advancing IoT
Communication Security
with TLS and DTLS v1.3
Hannes Tschofenig
Senior Principal Engineer
Arm
2Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Today’s IoT security experience
Vulnerable IoT products
Top 5 IoT device security vulnerabilities:
1. No or Limited software update mechanism
2. Missing key management
3. Inappropriate access control
4. Missing communication security
5. Vulnerability to physical attacks
Lots of security recommendations
3Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Communication security is a must-have feature
Unsurprisingly, our PSA Threat Models and Security Analysis (TMSA) reference examples
also demand communication security.
Designing your own communication security crypto is almost always a bad idea.
Luckily, with TLS & DTLS standardized communication security protocols are available.
Arm Platform Security Architecture (PSA)
Asset Tracker TMSA Smart Water Meter TMSA Network Camera TMSA
4Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Which TLS & DTLS version?
With RFC 7925 and RFC 7525 we have TLS & DTLS profiles that exclude
problematic algorithms.
There are also lots of extensions that provide security and performance
enhancements.
TLS/DTLS 1.2 with these profiles is a perfectly fine way to secure IoT
communication efficiently.
TLS/DTLS 1.3 provides
1. A performance improvement, and
2. better privacy protection
(influenced by BCP 188 ‘Pervasive Monitoring Is an Attack’)
5Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
It is a re-design
Roundtrips
Features
Message sizes
Code Size
Cryptographic operations
6Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Roundtrips
Features
Message sizes
Code Size
Cryptographic operations
7Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
TLS 1.3 Public Key based Authentication
ServerClient
ClientHello (+key_share, +signature_algorithms,
+supported_groups, +supported_versions)
ServerHello(+key_share),
{EncryptedExtensions(+supported_groups*)},
{CertificateRequest*}, {Certificate*},
{CertificateVerify*}, {Finished},
[Application Data*]
{Certificate*}, {CertificateVerify*},
{Finished}, [Application Data]
[Application Data]
Legend: *: optional message, []: Not a
handshake message, {}: Encrypted message
Application data is
already sent by the
client after the first
roundtrip.
Public key-based
exchange always uses
perfect forward
secrecy using an
ephemeral Diffie-
Hellman exchange.
8Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
TLS 1.3 Pre-Shared Key (PSK) Authentication
ServerClient
ClientHello (+key_share*, +psk_key_exchange_modes, pre_shared_key)
ServerHello(+key_share*, +pre_shared_key),
{EncryptedExtensions}, {Finished}, [Application Data*]
{Finished}, [Application Data]
[Application Data]
Legend:
*: optional message
{} Indicates messages protected using keys derived from handshake_traffic_secret.
[]: Indicates messages protected using keys derived from traffic_secret_N
Key_share extension
only needed
when perfect forward
secrecy is required.
Contains psk
identity and
“binder”
(= one or multiple
MAC values)
Application data is
already sent by the
client after the first
roundtrip.
Harmonized three PSK modes
available in TLS 1.2 into one
9Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
TLS 1.3 0-RTT Data
ServerClient
ClientHello (+early_data, +key_share*,
+psk_key_exchange_modes, pre_shared_key),
(Application Data*)
ServerHello(+pre_shared_key, +key_share*),
{EncryptedExtensions, early_data*},
{Finished}, [Application Data*]
(EndOfEarlyData), {Finished}, [Application Data]
Legend:
*: optional message
() Indicates messages protected using keys derived from client_early_traffic_secret.
{} Indicates messages protected using keys derived from [sender]_handshake_traffic_secret.
[]: Indicates messages protected using keys derived from [sender]_application_traffic_secret_N
Application data is
already sent by the
client after the first
roundtrip.
Danger of replay.
Application layer
needs to check for
replay.
Requires API changes
10Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Roundtrips
Features
Message sizes
Code Size
Cryptographic operations
11Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Privacy Protection
TLS 1.3
TLS 1.2
+PFS, -key transport, +padding, +various unlinkability properties.
12Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Eavesdropping and intercepting TLS handshakes
became much more difficult.
Claimed to cause problems for enterprise network
management.
Resulted in delayed publication of the TLS spec and
polarized IETF engineering community.
Additional extensions are being developed that even
encrypt the Server Name Indication (SNI).
Firewall vendors are not happy
Article reference: https://www.theregister.co.uk/2018/03/23/tls_1_3_approved_ietf/
13Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Regular DTLS Communication
DTLS
Handshake
NATClient Server
DTLS
Handshake
Key &
algorithm
parameters
Security Parameter DatabaseNAT Bindings
14Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
IoT Device Sleeps
Note: According to [HomeGateway], the mean for TCP and UDP NAT binding timeouts is 386 minutes (TCP) and 160
seconds (UDP). Shorter timeout values require keepalive messages to be sent more frequently.
[HomeGateway] Haetoenen, S., et al., "An experimental study of home gateway characteristics", Proceedings of the 10th
ACM SIGCOMM conference on Internet measurement, November 2010.
NATClient Server
The NAT binding expired
after some time.
NAT Bindings
Key &
algorithm
parameters
Security Parameter Database
15Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
IoT Device wakes up
NATClient Server
Key &
algorithm
parameters
Security Parameter Database
DTLS packets get
dropped by the
server.
NAT Bindings
16Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
CID Solution
Demultiplexing based on a new field, the Connection ID (CID). This CID value is carried in
the DTLS Record Layer.
Extension to handshake to negotiate feature, i.e., optional to use.
CID value is directional.
Specification available for DTLS 1.2 and DTLS 1.3. Still work in progress in the IETF TLS
working group!
Prototype (for DTLS 1.2) available that uses Mbed TLS.
The DTLS 1.2 and the 1.3 solution different in their privacy protection capabilities.
17Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Roundtrips
Features
Message sizes
Code Size
Cryptographic operations
18Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Over-the-Wire Overhead
620
2395
854
3260
532
1836
840
2403
0
500
1000
1500
2000
2500
3000
3500
PSK (AES-128-CCM) ECDSA-ECDHE (AES-128-CCM +
P256r1)
PSK (AES-256-CCM) ECDSA-ECDHE (AES-256-CCM +
P512r1)
TLS 1.2 TLS 1.3
19Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
DTLS Record Layer Header
DTLS 1.2 Plaintext Header DTLS 1.3 Optimized Header
(Complete)
DTLS 1.3 Optimized Header
(Minimal)
Removed
unused fields.
Shorten existing
fields
Variable length
header encoding
with optional
fields
20Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Roundtrips
Features
Message sizes
Code Size
Cryptographic operations
21Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Implementations - a long list …
Live servers available for testing. Many implementations not yet at RFC version and do not implement all
features.
name language role(s) version features/limitations
fizz C++ C/S -28
Based on libsodium, includes secure design abstractions.
Zero-copy for advanced performance.
NSS C C/S RFC 8446 Almost everything, except post-handshake auth and X448
Mint Go C/S -18 PSK resumption, 0-RTT, HRR
nqsb OCaml C/S -11 PSK/DHE-PSK, no EC*, no client auth, no 0RTT
ProtoTLS JavaScript C/S -13 EC/DHE/PSK, no HelloRetryRequest
miTLS F* C/S RFC 8446 EC/DHE/PSK/0-RTT, no RSA-PSS, no post-HS-auth, no ESNI
Mbed TLS C C/S RFC 8446 Prototype implementation only. ECDSA+ECDHE, external
PSK, PSK resumption, PSK-ECDHE, 0-RTT, Client auth,
HelloRetryRequest
(+ a DTLS 1.3 implementation of an earlier draft version)
… … … … …
22Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Flash size
PSK (AES-128-CCM)
PSK (AES-128-CCM + AES-256-
CCM)
ECDSA-ECDHE (AES-128-CCM +
P256r1)
ECDSA-ECDHE (AES-256-CCM +
P512r1)
All of the
above+0RTT+Compatibility+Tic
ket
TLS 1.2 19 24 57 64
TLS 1.3 22 27 51 68 72
0
10
20
30
40
50
60
70
80
KiB
TLS 1.2 TLS 1.3
23Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Flash Size (TLS 1.3, PSK, AES-128-CCM)
24Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Flash Size (TLS 1.3, ECDSA-ECDHE (P2561), AES-128-CCM)
25Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Cryptographic operations
Roundtrips
Features
Message sizes
Code Size
26Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Key Hierarchy
Differences between 1.2 and 1.3:
 Most handshake messages are encrypted
 The HMAC-based Extract-and-Expand Key
Derivation Function (HKDF, RFC 5869) with
TLS-specific input parameters is used.
Results:
 Easier to analyse for cryptographers
 More secure
 More complex to implement, and larger
number of hash calculations
Key derivation for
exchange stages
Key derivation for
Negotiated cipher
HKDF
HKDF
27Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Compatibility Mode
Making TLS 1.3 work in today’s Internet
A number of middleboxes misbehave when a TLS
client/server pair negotiates TLS 1.3.
Three changes got introduced:
1. Pretend to do a session resumption.
2. Use bigger ServerHello instead of optimized
HelloRetryRequest message
3. Transmit fake ChangeCipherSpec messages
Luckily not a problem for DTLS 1.3
ServerClient
ClientHello
ServerHello, ChangeCipherSpec,
{EncryptedExtensions}, {CertificateRequest*},
{Certificate*}, {CertificateVerify*},
{Finished}, [Application Data*]
ChangeCipherSpec, {Certificate*},
{CertificateVerify*}, {Finished},
[Application Data]
[Application Data]
28Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Summary and next steps
29Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
• TLS & DTLS 1.2 following profiles are secure, and widely deployed today. Use it.
• TLS 1.3 is a redesign offering improved speed, and privacy.
• DTLS 1.3 follows the design of TLS 1.3 with optimizations for IoT.
The latest version can be found in draft-ietf-tls-dtls13.
• TLS standardization has seen a new level of engineering professionalism with the
number of working group participants and the extensive use of formal methods.
Summary
30Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Next steps
For the IETF TLS Working Group
Completing the DTLS 1.3 and the
Connection ID specifications in the next
few months.
The IETF is an open organization and
welcomes your input.
For Arm
We are constantly adding features to make
security on IoT faster and more efficient.
Example: fragmentation and segmentation
of handshake msgs in Mbed TLS 2.13.0
TLS and DTLS are used in
31Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Trademark and copyright statement
The trademarks featured in this presentation are
registered and/or unregistered trademarks of Arm
(or its subsidiaries) in the EU and/or elsewhere.
All rights reserved. All other marks featured may
be trademarks of their respective owners.
Copyright © 2018
Thank You!
31
32Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Backup Slides
33Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
Detailed List of Changes to TLS / DTLS 1.3
Summary
Simplified Design
• Cleaned-up list of supported algorithms
(List will, however, grow very soon…)
• Removed RSA key transport
• Removed custom Diffie-Hellman groups
• Removed compression and renegotiation
• Removed password-based key exchanges
• Streamlined session resumption (with and without
servers-side state) and PSK extension
Improvements
• New ciphersuite concept that separates key exchange
mechanism from cipher negotiation
• Added solid version negotiation
• Support for a more aggressive use of Diffie-Hellman
for perfect forward secrecy
• Key hierarchy easier to analyse
(but more complex for implementers)
• Encrypting messages earlier in the handshake
(for privacy reasons)
• Relies on standardized key derivation function based
on HKDF (HMAC-based Extract-and-Expand Key
Derivation Function)
34Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
TLS 1.2 Pre-Shared Key based Authentication
and Session Resumption
TLS 1.2 PSK-Auth TLS 1.2 Session Resumption
ServerClient
ClientHello
ServerHello
ServerKeyExchange*
ServerHelloDone
ClientKeyExchange,
[ChangeCipherSpec]
Finished
[ChangeCipherSpec]
Finished
[Application Data]
ServerClient
ClientHello (+SessionID)
ServerHello
[ChangeCipherSpec]
Finished
[ChangeCipherSpec]
Finished
[Application Data]
Legend: *: optional message, []: Not a
handshake message, {}: Encrypted message
35Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
TLS 1.2 Session Resumption without Server-Side State
Shares benefits with plain session
resumption mechanism.
+ Increased scalability due to distributed
session state storage
Very popular on the web.
ServerClient
ClientHello (+SessionTicket extension)
ServerHello
(empty SessionTicket extension)
NewSessionTicket
[ChangeCipherSpec]
Finished
[ChangeCipherSpec]
Finished
[Application Data]
36Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
TLS 1.3 Ticket Exchange
ServerClient
[NewSessionTicket]
TLS 1.3 Handshake
NewSessionTicket message is a post handshake message.
Ticket is contained either “per-value”
or “per-reference”.
Ticket becomes psk_identity in a subsequent handshake.
struct {
uint32 ticket_lifetime;
uint32 ticket_age_add;
opaque ticket<1..2^16-1>;
Extension extensions<0..2^16-2>;
} NewSessionTicket;
37Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
TLS 1.3 Record Layer
All ciphers are modelled as “Authenticated Encryption with Additional Data” (AEAD).
AEAD algorithms take as input
• a single key (client_write_key or server_write_key),
• a nonce (see next slide),
• a plaintext,
• and “additional data” (which is empty).
struct {
opaque content[TLSPlaintext.length];
ContentType type;
uint8 zeros[length_of_padding];
} TLSInnerPlaintext;
38Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
 Each encrypted record consists of
 a plaintext header
 an encrypted body.
struct {
ContentType opaque_type = 23; /* application_data */
ProtocolVersion legacy_record_version = 0x0301; /* TLS v1.x */
uint16 length;
opaque encrypted_record[length];
} TLSCiphertext;
TLS 1.3 Record Layer, cont.
39Copyright © 2018 Arm TechCon, All rights reserved.
#ArmTechCon
CID Solution
Differences
DTLS 1.2
• CID value unchanged over the lifetime
because CID values are only exchanged
at the beginning of the handshake.
• Tracking possibilities exist but are not
different than re-running the DTLS
handshake itself.
DTLS 1.3
• Post-handshake message to update
Connection ID using
RequestConnectionID/
NewConnectionID messages.
• Offers better privacy protection against
tracking by on-path observer.
• Unlinkability requires sequence number
to be encrypted as well.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
 
Windows Forensic 101
Windows Forensic 101Windows Forensic 101
Windows Forensic 101
 
Hacker tool talk: maltego
Hacker tool talk: maltegoHacker tool talk: maltego
Hacker tool talk: maltego
 
Data center
Data centerData center
Data center
 
WhatsApp security
WhatsApp securityWhatsApp security
WhatsApp security
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
OWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-DiveOWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-Dive
 
Raspberry Pi - Lecture 2 Linux OS
Raspberry Pi - Lecture 2 Linux OSRaspberry Pi - Lecture 2 Linux OS
Raspberry Pi - Lecture 2 Linux OS
 
Cloud Computing paradigm
Cloud Computing paradigmCloud Computing paradigm
Cloud Computing paradigm
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
eyeos technology
eyeos technologyeyeos technology
eyeos technology
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Firewall
FirewallFirewall
Firewall
 
Cloud slide
Cloud slideCloud slide
Cloud slide
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Cloud Computing Design Considerations
Cloud Computing Design ConsiderationsCloud Computing Design Considerations
Cloud Computing Design Considerations
 

Similar a Advancing IoT Communication Security with TLS and DTLS v1.3

BSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINALBSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINAL
Glenn Haley
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Ramesh Nagappan
 

Similar a Advancing IoT Communication Security with TLS and DTLS v1.3 (20)

Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
 
RISC-V 30906 hex five multi_zone iot firmware
RISC-V 30906 hex five multi_zone iot firmwareRISC-V 30906 hex five multi_zone iot firmware
RISC-V 30906 hex five multi_zone iot firmware
 
Secure IoT Firmware for RISC-V
Secure IoT Firmware for RISC-VSecure IoT Firmware for RISC-V
Secure IoT Firmware for RISC-V
 
Wi fi-security-the-details-matter
Wi fi-security-the-details-matterWi fi-security-the-details-matter
Wi fi-security-the-details-matter
 
Transport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaTransport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal Wadhwa
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP segura
 
BSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINALBSET_Lecture_Crypto and SSL_Overview_FINAL
BSET_Lecture_Crypto and SSL_Overview_FINAL
 
Ip sec
Ip secIp sec
Ip sec
 
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesMeasuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
 
Oczyszczacz powietrza i stos sieciowy? Czas na test! Semihalf Barcamp 13/06/2018
Oczyszczacz powietrza i stos sieciowy? Czas na test! Semihalf Barcamp 13/06/2018Oczyszczacz powietrza i stos sieciowy? Czas na test! Semihalf Barcamp 13/06/2018
Oczyszczacz powietrza i stos sieciowy? Czas na test! Semihalf Barcamp 13/06/2018
 
VoIP
VoIPVoIP
VoIP
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 5
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
wolfSSL and TLS 1.3
wolfSSL and TLS 1.3wolfSSL and TLS 1.3
wolfSSL and TLS 1.3
 
Sequere socket Layer
Sequere socket LayerSequere socket Layer
Sequere socket Layer
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 

Más de Hannes Tschofenig

A guide to make your research less successful
A guide to make your research less successfulA guide to make your research less successful
A guide to make your research less successful
Hannes Tschofenig
 

Más de Hannes Tschofenig (9)

The Role of Standards in IoT Security
The Role of Standards in IoT SecurityThe Role of Standards in IoT Security
The Role of Standards in IoT Security
 
Device Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2MDevice Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2M
 
Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0Authorization for Internet of Things using OAuth 2.0
Authorization for Internet of Things using OAuth 2.0
 
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based MicroprocessorsPerformance of State-of-the-Art Cryptography on ARM-based Microprocessors
Performance of State-of-the-Art Cryptography on ARM-based Microprocessors
 
Smart Object Architecture
Smart Object ArchitectureSmart Object Architecture
Smart Object Architecture
 
Crypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M ProcessorsCrypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M Processors
 
UMA for ACE
UMA for ACEUMA for ACE
UMA for ACE
 
How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?How to Select Hardware for Internet of Things Systems?
How to Select Hardware for Internet of Things Systems?
 
A guide to make your research less successful
A guide to make your research less successfulA guide to make your research less successful
A guide to make your research less successful
 

Último

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 

Último (20)

Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 

Advancing IoT Communication Security with TLS and DTLS v1.3

  • 1. Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Advancing IoT Communication Security with TLS and DTLS v1.3 Hannes Tschofenig Senior Principal Engineer Arm
  • 2. 2Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Today’s IoT security experience Vulnerable IoT products Top 5 IoT device security vulnerabilities: 1. No or Limited software update mechanism 2. Missing key management 3. Inappropriate access control 4. Missing communication security 5. Vulnerability to physical attacks Lots of security recommendations
  • 3. 3Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Communication security is a must-have feature Unsurprisingly, our PSA Threat Models and Security Analysis (TMSA) reference examples also demand communication security. Designing your own communication security crypto is almost always a bad idea. Luckily, with TLS & DTLS standardized communication security protocols are available. Arm Platform Security Architecture (PSA) Asset Tracker TMSA Smart Water Meter TMSA Network Camera TMSA
  • 4. 4Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Which TLS & DTLS version? With RFC 7925 and RFC 7525 we have TLS & DTLS profiles that exclude problematic algorithms. There are also lots of extensions that provide security and performance enhancements. TLS/DTLS 1.2 with these profiles is a perfectly fine way to secure IoT communication efficiently. TLS/DTLS 1.3 provides 1. A performance improvement, and 2. better privacy protection (influenced by BCP 188 ‘Pervasive Monitoring Is an Attack’)
  • 5. 5Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon It is a re-design Roundtrips Features Message sizes Code Size Cryptographic operations
  • 6. 6Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Roundtrips Features Message sizes Code Size Cryptographic operations
  • 7. 7Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon TLS 1.3 Public Key based Authentication ServerClient ClientHello (+key_share, +signature_algorithms, +supported_groups, +supported_versions) ServerHello(+key_share), {EncryptedExtensions(+supported_groups*)}, {CertificateRequest*}, {Certificate*}, {CertificateVerify*}, {Finished}, [Application Data*] {Certificate*}, {CertificateVerify*}, {Finished}, [Application Data] [Application Data] Legend: *: optional message, []: Not a handshake message, {}: Encrypted message Application data is already sent by the client after the first roundtrip. Public key-based exchange always uses perfect forward secrecy using an ephemeral Diffie- Hellman exchange.
  • 8. 8Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon TLS 1.3 Pre-Shared Key (PSK) Authentication ServerClient ClientHello (+key_share*, +psk_key_exchange_modes, pre_shared_key) ServerHello(+key_share*, +pre_shared_key), {EncryptedExtensions}, {Finished}, [Application Data*] {Finished}, [Application Data] [Application Data] Legend: *: optional message {} Indicates messages protected using keys derived from handshake_traffic_secret. []: Indicates messages protected using keys derived from traffic_secret_N Key_share extension only needed when perfect forward secrecy is required. Contains psk identity and “binder” (= one or multiple MAC values) Application data is already sent by the client after the first roundtrip. Harmonized three PSK modes available in TLS 1.2 into one
  • 9. 9Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon TLS 1.3 0-RTT Data ServerClient ClientHello (+early_data, +key_share*, +psk_key_exchange_modes, pre_shared_key), (Application Data*) ServerHello(+pre_shared_key, +key_share*), {EncryptedExtensions, early_data*}, {Finished}, [Application Data*] (EndOfEarlyData), {Finished}, [Application Data] Legend: *: optional message () Indicates messages protected using keys derived from client_early_traffic_secret. {} Indicates messages protected using keys derived from [sender]_handshake_traffic_secret. []: Indicates messages protected using keys derived from [sender]_application_traffic_secret_N Application data is already sent by the client after the first roundtrip. Danger of replay. Application layer needs to check for replay. Requires API changes
  • 10. 10Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Roundtrips Features Message sizes Code Size Cryptographic operations
  • 11. 11Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Privacy Protection TLS 1.3 TLS 1.2 +PFS, -key transport, +padding, +various unlinkability properties.
  • 12. 12Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Eavesdropping and intercepting TLS handshakes became much more difficult. Claimed to cause problems for enterprise network management. Resulted in delayed publication of the TLS spec and polarized IETF engineering community. Additional extensions are being developed that even encrypt the Server Name Indication (SNI). Firewall vendors are not happy Article reference: https://www.theregister.co.uk/2018/03/23/tls_1_3_approved_ietf/
  • 13. 13Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Regular DTLS Communication DTLS Handshake NATClient Server DTLS Handshake Key & algorithm parameters Security Parameter DatabaseNAT Bindings
  • 14. 14Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon IoT Device Sleeps Note: According to [HomeGateway], the mean for TCP and UDP NAT binding timeouts is 386 minutes (TCP) and 160 seconds (UDP). Shorter timeout values require keepalive messages to be sent more frequently. [HomeGateway] Haetoenen, S., et al., "An experimental study of home gateway characteristics", Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, November 2010. NATClient Server The NAT binding expired after some time. NAT Bindings Key & algorithm parameters Security Parameter Database
  • 15. 15Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon IoT Device wakes up NATClient Server Key & algorithm parameters Security Parameter Database DTLS packets get dropped by the server. NAT Bindings
  • 16. 16Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon CID Solution Demultiplexing based on a new field, the Connection ID (CID). This CID value is carried in the DTLS Record Layer. Extension to handshake to negotiate feature, i.e., optional to use. CID value is directional. Specification available for DTLS 1.2 and DTLS 1.3. Still work in progress in the IETF TLS working group! Prototype (for DTLS 1.2) available that uses Mbed TLS. The DTLS 1.2 and the 1.3 solution different in their privacy protection capabilities.
  • 17. 17Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Roundtrips Features Message sizes Code Size Cryptographic operations
  • 18. 18Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Over-the-Wire Overhead 620 2395 854 3260 532 1836 840 2403 0 500 1000 1500 2000 2500 3000 3500 PSK (AES-128-CCM) ECDSA-ECDHE (AES-128-CCM + P256r1) PSK (AES-256-CCM) ECDSA-ECDHE (AES-256-CCM + P512r1) TLS 1.2 TLS 1.3
  • 19. 19Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon DTLS Record Layer Header DTLS 1.2 Plaintext Header DTLS 1.3 Optimized Header (Complete) DTLS 1.3 Optimized Header (Minimal) Removed unused fields. Shorten existing fields Variable length header encoding with optional fields
  • 20. 20Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Roundtrips Features Message sizes Code Size Cryptographic operations
  • 21. 21Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Implementations - a long list … Live servers available for testing. Many implementations not yet at RFC version and do not implement all features. name language role(s) version features/limitations fizz C++ C/S -28 Based on libsodium, includes secure design abstractions. Zero-copy for advanced performance. NSS C C/S RFC 8446 Almost everything, except post-handshake auth and X448 Mint Go C/S -18 PSK resumption, 0-RTT, HRR nqsb OCaml C/S -11 PSK/DHE-PSK, no EC*, no client auth, no 0RTT ProtoTLS JavaScript C/S -13 EC/DHE/PSK, no HelloRetryRequest miTLS F* C/S RFC 8446 EC/DHE/PSK/0-RTT, no RSA-PSS, no post-HS-auth, no ESNI Mbed TLS C C/S RFC 8446 Prototype implementation only. ECDSA+ECDHE, external PSK, PSK resumption, PSK-ECDHE, 0-RTT, Client auth, HelloRetryRequest (+ a DTLS 1.3 implementation of an earlier draft version) … … … … …
  • 22. 22Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Flash size PSK (AES-128-CCM) PSK (AES-128-CCM + AES-256- CCM) ECDSA-ECDHE (AES-128-CCM + P256r1) ECDSA-ECDHE (AES-256-CCM + P512r1) All of the above+0RTT+Compatibility+Tic ket TLS 1.2 19 24 57 64 TLS 1.3 22 27 51 68 72 0 10 20 30 40 50 60 70 80 KiB TLS 1.2 TLS 1.3
  • 23. 23Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Flash Size (TLS 1.3, PSK, AES-128-CCM)
  • 24. 24Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Flash Size (TLS 1.3, ECDSA-ECDHE (P2561), AES-128-CCM)
  • 25. 25Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Cryptographic operations Roundtrips Features Message sizes Code Size
  • 26. 26Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Key Hierarchy Differences between 1.2 and 1.3:  Most handshake messages are encrypted  The HMAC-based Extract-and-Expand Key Derivation Function (HKDF, RFC 5869) with TLS-specific input parameters is used. Results:  Easier to analyse for cryptographers  More secure  More complex to implement, and larger number of hash calculations Key derivation for exchange stages Key derivation for Negotiated cipher HKDF HKDF
  • 27. 27Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Compatibility Mode Making TLS 1.3 work in today’s Internet A number of middleboxes misbehave when a TLS client/server pair negotiates TLS 1.3. Three changes got introduced: 1. Pretend to do a session resumption. 2. Use bigger ServerHello instead of optimized HelloRetryRequest message 3. Transmit fake ChangeCipherSpec messages Luckily not a problem for DTLS 1.3 ServerClient ClientHello ServerHello, ChangeCipherSpec, {EncryptedExtensions}, {CertificateRequest*}, {Certificate*}, {CertificateVerify*}, {Finished}, [Application Data*] ChangeCipherSpec, {Certificate*}, {CertificateVerify*}, {Finished}, [Application Data] [Application Data]
  • 28. 28Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Summary and next steps
  • 29. 29Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon • TLS & DTLS 1.2 following profiles are secure, and widely deployed today. Use it. • TLS 1.3 is a redesign offering improved speed, and privacy. • DTLS 1.3 follows the design of TLS 1.3 with optimizations for IoT. The latest version can be found in draft-ietf-tls-dtls13. • TLS standardization has seen a new level of engineering professionalism with the number of working group participants and the extensive use of formal methods. Summary
  • 30. 30Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Next steps For the IETF TLS Working Group Completing the DTLS 1.3 and the Connection ID specifications in the next few months. The IETF is an open organization and welcomes your input. For Arm We are constantly adding features to make security on IoT faster and more efficient. Example: fragmentation and segmentation of handshake msgs in Mbed TLS 2.13.0 TLS and DTLS are used in
  • 31. 31Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Trademark and copyright statement The trademarks featured in this presentation are registered and/or unregistered trademarks of Arm (or its subsidiaries) in the EU and/or elsewhere. All rights reserved. All other marks featured may be trademarks of their respective owners. Copyright © 2018 Thank You! 31
  • 32. 32Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Backup Slides
  • 33. 33Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon Detailed List of Changes to TLS / DTLS 1.3 Summary Simplified Design • Cleaned-up list of supported algorithms (List will, however, grow very soon…) • Removed RSA key transport • Removed custom Diffie-Hellman groups • Removed compression and renegotiation • Removed password-based key exchanges • Streamlined session resumption (with and without servers-side state) and PSK extension Improvements • New ciphersuite concept that separates key exchange mechanism from cipher negotiation • Added solid version negotiation • Support for a more aggressive use of Diffie-Hellman for perfect forward secrecy • Key hierarchy easier to analyse (but more complex for implementers) • Encrypting messages earlier in the handshake (for privacy reasons) • Relies on standardized key derivation function based on HKDF (HMAC-based Extract-and-Expand Key Derivation Function)
  • 34. 34Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon TLS 1.2 Pre-Shared Key based Authentication and Session Resumption TLS 1.2 PSK-Auth TLS 1.2 Session Resumption ServerClient ClientHello ServerHello ServerKeyExchange* ServerHelloDone ClientKeyExchange, [ChangeCipherSpec] Finished [ChangeCipherSpec] Finished [Application Data] ServerClient ClientHello (+SessionID) ServerHello [ChangeCipherSpec] Finished [ChangeCipherSpec] Finished [Application Data] Legend: *: optional message, []: Not a handshake message, {}: Encrypted message
  • 35. 35Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon TLS 1.2 Session Resumption without Server-Side State Shares benefits with plain session resumption mechanism. + Increased scalability due to distributed session state storage Very popular on the web. ServerClient ClientHello (+SessionTicket extension) ServerHello (empty SessionTicket extension) NewSessionTicket [ChangeCipherSpec] Finished [ChangeCipherSpec] Finished [Application Data]
  • 36. 36Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon TLS 1.3 Ticket Exchange ServerClient [NewSessionTicket] TLS 1.3 Handshake NewSessionTicket message is a post handshake message. Ticket is contained either “per-value” or “per-reference”. Ticket becomes psk_identity in a subsequent handshake. struct { uint32 ticket_lifetime; uint32 ticket_age_add; opaque ticket<1..2^16-1>; Extension extensions<0..2^16-2>; } NewSessionTicket;
  • 37. 37Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon TLS 1.3 Record Layer All ciphers are modelled as “Authenticated Encryption with Additional Data” (AEAD). AEAD algorithms take as input • a single key (client_write_key or server_write_key), • a nonce (see next slide), • a plaintext, • and “additional data” (which is empty). struct { opaque content[TLSPlaintext.length]; ContentType type; uint8 zeros[length_of_padding]; } TLSInnerPlaintext;
  • 38. 38Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon  Each encrypted record consists of  a plaintext header  an encrypted body. struct { ContentType opaque_type = 23; /* application_data */ ProtocolVersion legacy_record_version = 0x0301; /* TLS v1.x */ uint16 length; opaque encrypted_record[length]; } TLSCiphertext; TLS 1.3 Record Layer, cont.
  • 39. 39Copyright © 2018 Arm TechCon, All rights reserved. #ArmTechCon CID Solution Differences DTLS 1.2 • CID value unchanged over the lifetime because CID values are only exchanged at the beginning of the handshake. • Tracking possibilities exist but are not different than re-running the DTLS handshake itself. DTLS 1.3 • Post-handshake message to update Connection ID using RequestConnectionID/ NewConnectionID messages. • Offers better privacy protection against tracking by on-path observer. • Unlinkability requires sequence number to be encrypted as well.