《Attested TLS and formalization.pdf》由会员分享,可在线阅读,更多相关《Attested TLS and formalization.pdf(15页珍藏版)》请在三个皮匠报告上搜索。
1、Enhanced Security in Transport Layer using Remote Attestation Attested TLS and FormalizationYogesh Deshpande Principal Engineer,ArmMuhammad Usama Sardar Research Associate,TU DresdenAttested TLS and FormalizationSecurity and Data ProtectionThe Transport Layer Security(TLS)handshake protocol allows a
2、uthentication of one or both peers using static,long-term credentialsIn some cases,it is also required to ensure that the peer runtime environment is in secure stateAttested TLS introduces a series of protocol extensions to the TLS 1.3 Handshake that enables binding of TLS authentication key to a re
3、mote attestation sessionWhat is Attested TLS?Need for Attested TLS?PKI Certificates used in TLS handshake are good at conveying a(network)identity of a serviceRemote Attestation is good at conveying the security state of a service,i.e.whether the execution environment is trustworthy?We can combine t
4、hem efficiently to get the security benefits of bothProposed Design uses Remote Attestation information as a first-class credentialsin a TLS HandshakeAttestation information(Evidence or Results),from any scheme,carried as extensions alongside X.509 certificate or using a new certificate typeThis app
5、roach has following benefitsBetter security Smaller attack surfaceBetter performance No need to run channel establishment and remote attestation sequentiallyProposed DesignAugmented TLS v1.3 HandshakeClientServerClient Hello(supported cipher suites,aTLS extension(s),Key ShareServer Hello(chosen ciph
6、er suite,aTLS extension(s),Key share,Certificate,Certificate Verify,FinishedCertificate(Optional),Certificate Verify(Optional),FinishedSecure data channelCERTIFICATEPRIVATE IDENTITY KEYATTESTATIONCREDENTIALEDGE DEVICESERVICEIoT/Edge Device OnboardingPRIVATE IDENTITY KEYCERTIFICAT