改进加密传输协议设计:深入研究 QUIC 案例

Florentin Rochet
{"title":"改进加密传输协议设计:深入研究 QUIC 案例","authors":"Florentin Rochet","doi":"arxiv-2409.07138","DOIUrl":null,"url":null,"abstract":"We propose in this paper to revisit the design of existing encrypted\ntransport protocols to improve their efficiency. We call the methodology\n\"Reverso\" from reversing the order of field elements within a protocol\nspecification. We detail how such a benign-looking change within the\nspecifications may unlock implementation optimizations for encrypted protocols.\nTo demonstrate our findings, we release quiceh, a QUIC implementation of QUIC\nVReverso, an extension of the QUIC V1 standard (RFC9000). Our methodology\napplied to the QUIC protocol reports ~30% of CPU efficiency improvement for\nprocessing packets at no added cost on the sender side and without relaxing any\nsecurity guarantee from QUIC V1. We also implement a fork of Cloudflare's\nHTTP/3 module and client/server demonstrator using quiceh and show our\noptimizations to directly transfer to HTTP/3 as well, resulting in our new\nHTTP/3 to be ~ 38% more efficient than the baseline implementation using QUIC\nV1. We argue that Reverso applies to any modern encrypted protocol and its\nimplementations and that similar efficiency improvement can also be unlocked\nfor them, independently of the layer in which they operate.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"41 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Improving Encrypted Transport Protocol Designs: Deep Dive on the QUIC Case\",\"authors\":\"Florentin Rochet\",\"doi\":\"arxiv-2409.07138\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose in this paper to revisit the design of existing encrypted\\ntransport protocols to improve their efficiency. We call the methodology\\n\\\"Reverso\\\" from reversing the order of field elements within a protocol\\nspecification. We detail how such a benign-looking change within the\\nspecifications may unlock implementation optimizations for encrypted protocols.\\nTo demonstrate our findings, we release quiceh, a QUIC implementation of QUIC\\nVReverso, an extension of the QUIC V1 standard (RFC9000). Our methodology\\napplied to the QUIC protocol reports ~30% of CPU efficiency improvement for\\nprocessing packets at no added cost on the sender side and without relaxing any\\nsecurity guarantee from QUIC V1. We also implement a fork of Cloudflare's\\nHTTP/3 module and client/server demonstrator using quiceh and show our\\noptimizations to directly transfer to HTTP/3 as well, resulting in our new\\nHTTP/3 to be ~ 38% more efficient than the baseline implementation using QUIC\\nV1. We argue that Reverso applies to any modern encrypted protocol and its\\nimplementations and that similar efficiency improvement can also be unlocked\\nfor them, independently of the layer in which they operate.\",\"PeriodicalId\":501332,\"journal\":{\"name\":\"arXiv - CS - Cryptography and Security\",\"volume\":\"41 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Cryptography and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.07138\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.07138","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

我们在本文中提议重新审视现有加密传输协议的设计,以提高其效率。我们将这种方法称为 "Reverso",即颠倒协议规范中字段元素的顺序。为了展示我们的发现,我们发布了 QUIC V1 标准(RFC9000)扩展 QUICVReverso 的 QUIC 实现 quiceh。我们应用于 QUIC 协议的方法报告称,CPU 处理数据包的效率提高了约 30%,而发送方没有增加任何成本,也没有放松 QUIC V1 的任何安全保证。我们还使用 quiceh 实现了 Cloudflare 的 HTTP/3 模块和客户端/服务器演示器的分叉,并展示了直接转移到 HTTP/3 的优化方案,结果是我们的新 HTTP/3 比使用 QUICV1 的基线实现提高了约 38% 的效率。我们认为,Reverso 适用于任何现代加密协议及其实现,而且也能为它们带来类似的效率提升,而与它们运行的层无关。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Improving Encrypted Transport Protocol Designs: Deep Dive on the QUIC Case
We propose in this paper to revisit the design of existing encrypted transport protocols to improve their efficiency. We call the methodology "Reverso" from reversing the order of field elements within a protocol specification. We detail how such a benign-looking change within the specifications may unlock implementation optimizations for encrypted protocols. To demonstrate our findings, we release quiceh, a QUIC implementation of QUIC VReverso, an extension of the QUIC V1 standard (RFC9000). Our methodology applied to the QUIC protocol reports ~30% of CPU efficiency improvement for processing packets at no added cost on the sender side and without relaxing any security guarantee from QUIC V1. We also implement a fork of Cloudflare's HTTP/3 module and client/server demonstrator using quiceh and show our optimizations to directly transfer to HTTP/3 as well, resulting in our new HTTP/3 to be ~ 38% more efficient than the baseline implementation using QUIC V1. We argue that Reverso applies to any modern encrypted protocol and its implementations and that similar efficiency improvement can also be unlocked for them, independently of the layer in which they operate.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
PAD-FT: A Lightweight Defense for Backdoor Attacks via Data Purification and Fine-Tuning Artemis: Efficient Commit-and-Prove SNARKs for zkML A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts Among Cybersecurity Professionals Log2graphs: An Unsupervised Framework for Log Anomaly Detection with Efficient Feature Extraction Practical Investigation on the Distinguishability of Longa's Atomic Patterns
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1