Fingerprinting Schemes against a Post-Quantum Cryptography IPsec/IKEv2 Encryption Appliance
dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.advisor | Karanko, Pihla | |
dc.contributor.advisor | Dushku, Edlira | |
dc.contributor.author | Meeranath, Swetha | |
dc.contributor.school | Perustieteiden korkeakoulu | fi |
dc.contributor.supervisor | Brzuska, Chris | |
dc.date.accessioned | 2022-08-28T17:05:23Z | |
dc.date.available | 2022-08-28T17:05:23Z | |
dc.date.issued | 2022-08-22 | |
dc.description.abstract | Cryptographic protocols secure data transmission over an untrusted network. Although the encryption mechanisms ensure confidentiality of the data, the encrypted network traffic is prone to traffic analysis attacks. The aim of this thesis is to determine the attack vectors of a post-quantum safe IPsec/IKEv2 encryption appliance called NQX, that acts as a Virtual Private Network (VPN) device. We study the characteristics of encrypted data packets, such as packet length and timestamp and use them in fingerprinting methods to extract valuable information about the applications used at communication endpoints. Existing works on fingerprinting encrypted network traffic have tested different encryption appliances using different protocols, whereas in this thesis we have, for the first time, analyzed the fingerprinting schemes against NQX, which uses post-quantum cryptographic algorithms. Results from our experiments, such as fingerprinting of websites, browsers, SSH connection establishment and file transfers, show that the fingerprints in the form of graphs are unique for every application. We further evaluate the fingerprints using various statistical analyses such as cross-correlation, mean squared error and compression analysis to classify which website was accessed or which browser was used. Finally, we discuss some traffic flow confidentiality mechanisms to overcome traffic analysis attacks. | en |
dc.format.extent | 56 + 3 | |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/116267 | |
dc.identifier.urn | URN:NBN:fi:aalto-202208285081 | |
dc.language.iso | en | en |
dc.programme | Master’s Programme in Security and Cloud Computing (SECCLO) | fi |
dc.programme.major | Security and Cloud Computing | fi |
dc.programme.mcode | SCI3113 | fi |
dc.subject.keyword | traffic analysis | en |
dc.subject.keyword | fingerprinting | en |
dc.subject.keyword | virtual private networks | en |
dc.subject.keyword | encryption | en |
dc.subject.keyword | confidentiality | en |
dc.subject.keyword | data analysis | en |
dc.title | Fingerprinting Schemes against a Post-Quantum Cryptography IPsec/IKEv2 Encryption Appliance | en |
dc.type | G2 Pro gradu, diplomityö | fi |
dc.type.ontasot | Master's thesis | en |
dc.type.ontasot | Diplomityö | fi |
local.aalto.electroniconly | yes | |
local.aalto.openaccess | no |