Ruhr-Uni-Bochum

TLS → Post-Quantum TLS: Inspecting the TLS landscape for PQC adoption on Android

2023

Conference / Journal

Research Hub

Research Hub C: Sichere Systeme

Research Challenges

RC 2: Quantum-Resistant Cryptography
RC 7: Building Secure Systems

Abstract

The ubiquitous use of smartphones has contributed to more and more users conducting their online browsing activities through apps, rather than web browsers. In order to provide a seamless browsing experience to the users, apps rely on a variety of HTTP-based APIs and third-party libraries, and make use of the TLS protocol to secure the underlying communication. With NIST's recent announcement of the first standards for post-quantum algorithms, there is a need to better understand the constraints and requirements of TLS usage by Android apps in order to make an informed decision for migration to the post-quantum world. In this paper, we performed an analysis of TLS usage by highest-ranked apps from Google Play Store to assess the resulting overhead for adoption of post-quantum algorithms. Our results show that apps set up large numbers of TLS connections with a median of 94, often to the same hosts. At the same time, many apps make little use of resumption to reduce the overhead of the TLS handshake. This will greatly magnify the impact of the transition to post-quantum cryptography, and we make recommendations for developers, server operators and the mobile operating systems to invest in making more use of these mitigating features or improving their accessibility. Finally, we briefly discuss how alternative proposals for post-quantum TLS handshakes might reduce the overhead.

Tags

Cryptography
Asymmetric Cryptography
Post-Quantum Cryptography
Cryptographic Protocols
Mobile Security
Network Security