12.4 Updating TLS secrets
At any time after a successful handshake, Alice and Bob can update their application traffic keys using the KeyUpdate
message. They accomplish this by first deriving new secrets server˙application˙traffic˙secret˙N+1
and client˙application˙traffic˙secret˙N+1
using the HKDF-Expand-Label function HEL as shown in Figure 12.13. After that, new application traffic keys are computed using a mechanism we will discuss in the next section.
Figure 12.13: Mechanism for updating TLS application traffic secrets
The TLS 1.3 specification recommends Alice and Bob to delete the n-th server/client application traffic secret and its associated key once the n + 1-th secret has been derived and corresponding traffic keys have been computed.
This is another example of a best practice in applied cryptography and security engineering: as soon as cryptographic material is no longer needed, it should be deleted so it cannot...