Analysis and Consideration on Management of Encrypted Traffic

There are two seemingly contradicting trends in the current Internet: increased deployment of end-to-end encryption and growth in the use of in-network functions to support specific services. Attempts to interact with or integrate middlebox functionality in end-to-end encryption environments has resulted in developments and standardisation contributions. This whitepaper analyses proposals for explicit middlebox cooperation mechanisms, as well as their impact on network operations to provide recommendations on how the stakeholders can constructively cooperate to provide a solution that can be widely accepted and supported.

READ FULL TEXT

page 1

page 8

research
07/07/2023

Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems

End-to-End Encryption (E2EE) aims to make all messages impossible to rea...
research
10/22/2018

Challenges in Network Management of Encrypted Traffic

This paper summarizes the challenges identified at the MAMI Management a...
research
04/13/2021

Going dark? Analysing the impact of end-to-end encryption on the outcome of Dutch criminal court cases

Former US attorney general William Barr and law enforcement colleagues f...
research
02/09/2022

Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems

In this paper, we assess existing technical proposals for content modera...
research
10/30/2020

A survey and analysis of TLS interception mechanisms and motivations

TLS is an end-to-end protocol designed to provide confidentiality and in...
research
05/17/2022

Can You Still See Me?: Reconstructing Robot Operations Over End-to-End Encrypted Channels

Connected robots play a key role in Industry 4.0, providing automation a...

Please sign up or login with your details

Forgot password? Click here to reset