It is desirable to speed up secure tunnel negotiations in constrained mediums where numerous clients are "competing" to form secure connections to destination servers or endpoints. In support of that objective, techniques are presented herein that minimize the authentication data that is transferred within encrypted tunnel handshakes under constrained conditions where the data can introduce unacceptable slowness or failures. The techniques may apply to Internet of Things (IoT) constrained environments in which bandwidth is sparse and multiple devices are competing for bandwidth. The techniques may also be used on the Internet with post-quantum algorithms, which can introduce unnecessary slowness due to their long keys and signatures. Other environments that may benefit include, for example, a Wireless Smart Utility Network (Wi-Sun) network, an Institute of Electrical and Electronics Engineers (IEEE) technical standard 802.15.4 network, virtual private networks (VPNs) and Zero-Trust Access networks, Web acceleration or proxy functions, etc.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.