usable encryption
play

Usable Encryption Class Presentation for CMSC 818D Wei Bai S - PowerPoint PPT Presentation

Usable Encryption Class Presentation for CMSC 818D Wei Bai S Application S Hardware Encryption S Web Encryption S Email Encryption OpenPGP S S/MIME S S Online Social Network Public Key Encryption S Encryption/Decryption


  1. Usable Encryption Class Presentation for CMSC 818D Wei Bai S

  2. Application S Hardware Encryption S Web Encryption S Email Encryption OpenPGP S S/MIME S S Online Social Network

  3. Public Key Encryption S Encryption/Decryption S Signing/Verifying

  4. Prototype for Public Key Encryption

  5. Prototype for Signing/Verifying Bob Alice

  6. Usable Encryption Design Aspects Key Encryption UI Management Design Aspects (Automatic) Encryption and Integration Decryption

  7. A. Whitten et al. “ Why Johnny can’t encrypt: a usability evaluation of PGP 5.0 ” S One of the pioneer works for encryption usability S Objective: Investigate usability in standard UI design vs security S A case study of PGP 5.0 through S Cognitive walkthrough analysis S Lab Study

  8. Definitions of Usability for Security S 1. Reliably made aware of the security tasks they need to perform S 2 . Able to figure out how to successfully perform those tasks S 3 . Don’t make dangerous errors S 4 . Comfortable with the interface to continue using it.

  9. Properties S 1. The unmotivated user property S 2 . The abstraction property S 3 . The lack of feedback property S 4 . The barn door property S 5 . The weakest link property

  10. Usability Standard for PGP S Encrypt/decrypt S Sign/verify S Key generation S Own public key publication S Public key acquiring S Avoid dangerous errors S Reasonable time

  11. Usability Analysis S Cognitive walkthrough Analysis S Wide considerations for more factors S Subjective S Lab Study S Limited scope of factor testing S Objective

  12. Cognitive analysis: Flaws in Design S Key management Issue S Visual : sign/verify S Different key types RSA for PGP, S Hellman/DSS for PGP 5.0 S S Key server S Errors playing with keys. Irreversible! Delete the private key, publicize the private key S

  13. Lab study S Integrate Eudora with PGP

  14. Lab study S Confirmed some points: S What keys to use? How to use them? S Confused about private/public keys S Use own/counterpart’s keys?

  15. Discussions 1. Dangerous errors and the barn door property: S If reversible? Regret allowed? S 2. Whether tutorials about encryption tasks, such as generating keys should be S included? Learnability: Learn by themselves, or taught by others? S 3. Is signing and verification necessary? S Closed circle S Phishing exists S 4. How about separating encryption and decryption tasks, to make study S shorter?

  16. S. Routi et al, “Confused Johnny: when automatic encryption leads to confusion and mistakes” S Objective S Investigate whether it makes more usable if hiding as many security details as possible S Method: S Lab study of Pwm (private webmail) system

  17. Pwm Highlights S Automatic key management and automatic encryption S Integrate tightly with existing webmail services S Key management by a key escrow S Advantage: Automatic key management S Users never lose their keys S Keys ported to new devices automatically S S Disadvantage Escrow has access to users’ keys S

  18. Comparative Usability Study S Task scenario: S Decrypt an email first S Send an encrypted email S Open a new Gmail session (with Pwm ended) S Perform well compared to existing webmail tools (w.r.t. SUS score)

  19. Key Findings S Performance of Message Protector is, on par with, slightly higher than Pwm. S Too transparent design loses trust to some extent S Reconsider manual encryption S The idea also comes from “Johnny for Facebook” paper.

  20. Discussions S Automatic key management by using a third party service? S Chicken and egg problem ! S Tradeoff between usability/security

  21. Helping Johnny 2.0 to encrypt His Facebook conversations S Objective: S Encryption usability for online social networks (OSNs) S Methods: S Two lab studies

  22. Mockup Lab Study

  23. Mockup Lab Study S Encryption schemes: S Auto/not auto: encryption button S Key management : S Manual: send keys over webmail S Auto: Passwords created at the first time, and then web browser caches it for further use.

  24. Key findings S Auto encryption and auto key management is preferable. S Manual encryption / manual decryption have higher security feeling, but lower acceptance S Key (password) recovery capability

  25. Discussions S Do/show something makes users assured? S Auto/not auto: encryption button S Key management : S Manual: send keys over webmail (chicken and egg problem again?) S S Auto: Passwords created at the first time, and then web browser caches it for further use. Password protection? Guessibility for password is much easier S than PKI keys.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend