What Is 0-RTT

Content on WhatAnswers is provided "as is" for informational purposes. While we strive for accuracy, we make no guarantees. Content is AI-assisted and should not be used as professional advice.

Last updated: April 11, 2026

Quick Answer: 0-RTT (Zero Round Trip Time) is a TLS 1.3 feature specified in RFC 8446 (March 2018) that allows clients to send application data during the initial handshake without waiting for server confirmation, eliminating one round trip. It can improve performance for approximately 40% of HTTPS connections that are session resumptions. However, 0-RTT data lacks forward secrecy and is vulnerable to replay attacks, requiring careful application-level design to prevent state-changing requests from being replayed.

Key Facts

Overview

0-RTT (Zero Round Trip Time) is a performance optimization feature introduced in TLS 1.3, standardized in RFC 8446 published in March 2018. It allows a client resuming a previous session to send application data (called "early data") in the first message to the server without waiting for the server's response, thereby eliminating one round trip time in the connection establishment process.

This feature specifically targets session resumption scenarios, which account for approximately 40% of HTTPS connections. By reducing the number of network round trips required to establish a secure connection and begin transmitting application data, 0-RTT can significantly improve perceived performance for end users, particularly those on high-latency networks or mobile connections. However, this performance benefit comes with important security trade-offs that developers must understand and mitigate.

How It Works

The 0-RTT mechanism operates through a carefully orchestrated exchange between client and server during the TLS handshake:

Key Comparisons

Feature0-RTT (Early Data)1-RTT Standard TLS 1.3Pre-TLS 1.3 Session Tickets
Handshake RoundsZero additional roundsOne round trip requiredOne round trip required
Forward SecrecyNo (PSK only)Yes (ServerRandom included)No (ticket only)
Replay ProtectionVulnerable (same PSK)Protected (ServerRandom unique)Vulnerable (same ticket)
Typical Latency Reduction~25-50% for resumptionsBaselineBaseline
Security LevelWeaker; requires app-level mitigationStrongest; recommended for all dataModerate; better than 0-RTT

Why It Matters

Understanding 0-RTT's capabilities and limitations is essential for modern web developers. While it offers measurable performance improvements for session resumptions, its security properties require thoughtful application design. Organizations must evaluate whether the latency reduction justifies the complexity of protecting against replay attacks. Many recommend enabling 0-RTT but educating development teams on its constraints, or using it selectively for genuinely safe operations only.

Sources

  1. RFC 8446 - The Transport Layer Security (TLS) Protocol Version 1.3IETF
  2. Introducing Zero Round Trip Time Resumption (0-RTT)proprietary
  3. Early Data (0-RTT) Documentationproprietary
  4. HAProxy - What is Zero Round-Trip Time Resumption (0-RTT)?proprietary

Missing an answer?

Suggest a question and we'll generate an answer for it.