🤖 AI Summary
This work addresses the lack of a rigorous theoretical foundation for side-channel leakage in modern encrypted communication protocols such as TLS 1.3 and QUIC, particularly in traffic analysis scenarios relying solely on side-channel features. The authors propose a formal information-theoretic model Σ = (Γ, Ω) that captures the causal chain from application semantics to network observables, leveraging composite channel structures and Lipschitz-based statistical propagation to analyze semantic distinguishability. They introduce and prove the "Side-Channel Existence Theorem," establishing the information-theoretic inevitability of side-channel leakage: in efficiency-oriented systems, any pair of distinguishable application semantics necessarily induces observable leakage. This result provides a verifiable mathematical basis for predicting attack feasibility, quantitatively evaluating defenses, and formally reasoning about the trade-off between efficiency and privacy.
📝 Abstract
The widespread adoption of TLS 1.3 and QUIC has rendered payload content invisible, shifting traffic analysis toward side-channel features. However, rigorous justification for why side-channel leakage is inevitable in encrypted communications has been lacking. This paper establishes a strict foundation from information theory by constructing a formal model \(\Sigma=(\Gamma,\Omega)\), where \(\Gamma=(A,\Pi,\Phi,N)\) describes the causal chain of application generation, protocol encapsulation, encryption transformation, and network transmission, while \(\Omega\) characterizes observation capabilities. Based on composite channel structure, data processing inequality, and Lipschitz statistics propagation, we propose and prove the Side-Channel Existence Theorem: for distinguishable semantic pairs, under conditions including mapping non-degeneracy (\(\mathbb{E}[d(z_P,z_N)\mid X]\le C\)), protocol-layer distinguishability (expectation difference \(\ge\bar\Delta\)), Lipschitz continuity, observation non-degeneracy (\(\rho>0\)), and propagation condition (\(C<\bar\Delta/2L_\varphi\)), the mutual information \(I(X;Y)\) is strictly positive with explicit lower bound. The corollary shows that in efficiency-prioritized systems, leakage is inevitable when at least one application pair is distinguishable. Three factors determine the boundary: non-degeneracy constant \(C\) constrained by efficiency, distinguishability \(\bar\Delta\) from application diversity, and \(\rho\) from analyst capabilities. This establishes the first rigorous information-theoretic foundation for encrypted traffic side channels, providing verifiable predictions for attack feasibility, quantifiable benchmarks for defenses, and mathematical basis for efficiency-privacy tradeoffs.