ETSI Releases Report on Problems from Pervasive Encrypted Traffic
Wednesday, September 01, 2021 | Comments

The European Telecommunications Standards Institute’s (ETSI) Industry Specification Group on Encrypted Traffic Integration (ISG ETI) concluded the early part of its work, by identifying problems arising from pervasive encrypted traffic in communications networks.

In the group’s first report, ETSI GR ETI 001, entitled “Encrypted Traffic Integration (ETI); Problem Statement,” ISG ETI identifies the impact of encrypted traffic on stakeholders and how these stakeholders' objectives interrelate. The rise of the use of encryption places networks and users at risk, whilst offering promises of security.

The use of encryption as the default approach to enhance the security of communications has become increasingly common. While there are often benefits, in many scenarios, the use of encryption exposes users to threats from malicious traffic which, since it is not recognized because it is hidden by encryption, can no longer be filtered out by the network operator to protect the end user. The use of end-to-end encryption can restrict the ability of network management, anti-fraud, cybersecurity and regulatory monitoring systems to manage data and communications flowing into, through and out of networks.

Encryption protects traffic flowing through a network from unauthorized inspection. Nevertheless, encryption in itself does not protect the communicating end points from attack and reduces the ability of firewalls, in combination with other network management systems, to remove malicious traffic. Without being over-dramatic, the rise of a pervasive encryption model allows many of the worst elements of societal and human behavior to go unobserved, because trusted networks are not able to help to protect users, ETSI said.

The role of ETSI ISG ETI is to enable all the positive attributes of pervasive encryption to be enhanced, whilst allowing the networks to operate. This requires a deeper understanding of the problem, as evidenced in the GR ETI 001.

“The next step is to develop a set of requirements for the use of encryption, to offer a balance that allows network operation, while giving the user an assurance of confidentiality,” said ETSI ISG ETI vice chair Scott Cadzow. “This requirements analysis should be ready by the end of 2021.”

Find the full report here.

Would you like to comment on this story? Find our comments system below.

Post a comment
Name: *
Email: *
Title: *
Comment: *


No Comments Submitted Yet

Be the first by using the form above to submit a comment!


November 2022

8 - 10
Communications Marketing Conference (CMC)
Albuquerque, New Mexico

15 - 16
Wireless Leadership Summit (WLS)
Tucson, Arizona

March 2023

27 - 30
International Wireless Communications Expo (IWCE) 2023
Las Vegas

More Events >

Site Navigation