Paper 2023/651

Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3

Marc Fischlin, Technische Universität Darmstadt
Abstract

We show how to embed a covert key exchange sub protocol within a regular TLS 1.3 execution, generating a stealth key in addition to the regular session keys. The idea, which has appeared in the literature before, is to use the exchanged nonces to transport another key value. Our contribution is to give a rigorous model and analysis of the security of such embedded key exchanges, requiring that the stealth key remains secure even if the regular key is under adversarial control. Specifically for our stealth version of the TLS 1.3 protocol we show that this extra key is secure in this setting under the common assumptions about the TLS protocol. As an application of stealth key exchange we discuss sanitizable channel protocols, where a designated party can partly access and modify payload data in a channel protocol. This may be, for instance, an intrusion detection system monitoring the incoming traffic for malicious content and putting suspicious parts in quarantine. The noteworthy feature, inherited from the stealth key exchange part, is that the sender and receiver can use the extra key to still communicate securely and covertly within the sanitizable channel, e.g., by pre-encrypting confidential parts and making only dedicated parts available to the sanitizer. We discuss how such sanitizable channels can be implemented with authenticated encryption schemes like GCM or ChaChaPoly. In combination with our stealth key exchange protocol, we thus derive a full-fledged sanitizable connection protocol, including key establishment, which perfectly complies with regular TLS 1.3 traffic on the network level. We also assess the potential effectiveness of the approach for the intrusion detection system Snort.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Minor revision. ACM CCS 2023
Keywords
Key exchangesecure channelsanitizationTLS
Contact author(s)
marc fischlin @ tu-darmstadt de
History
2023-09-01: revised
2023-05-08: received
See all versions
Short URL
https://ia.cr/2023/651
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/651,
      author = {Marc Fischlin},
      title = {Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3},
      howpublished = {Cryptology ePrint Archive, Paper 2023/651},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/651}},
      url = {https://eprint.iacr.org/2023/651}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.