Why Johnny Can’t Encrypt A Usability Evaluation of GPG 5.0 Presented by Yin Shi.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

With your instructor, Jeremy Hyland
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Introduction to Online Data Collection (OLDC) Community Based Abstinence Education September, 2009.
Caleb Stepanian, Cindy Rogers, Nilesh Patel
Public Key Cryptography and GnuPG CPT 555 Network Security.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Pretty Good Privacy (PGP). How PGP works PGP uses both public-key cryptography and symmetric key cryptography, and includes a system which binds the public.
Lecture 5: security: PGP Anish Arora CSE 5473 Introduction to Network Security.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
PGP An example of Public Key Encryption software.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Trustworthy User Interface Design: Dynamic Security Skins Rachna Dhamija and J.D. Tygar University of California, Berkeley TIPPI Workshop June 13, 2005.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chapter 10: Authentication Guide to Computer Network Security.
Electronic Mail Security
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Masud Hasan Secue VS Hushmail Project 2.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Usability Studies Encryption Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech.
16.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 16 Security at the Application Layer: PGP and.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
The Battle Against Phishing: Dynamic Security Skins Rachna Dhamija and J.D. Tygar U.C. Berkeley.
Principle, utilization and limitations for secure electronic mail systems FACULDADE DE ENGENHARIA DA UNIVERSIDADE DO PORTO Segurança em Sistemas Informáticos.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Nathaniel S. Good Aaron Krekelberg Usability and privacy: a study of Kazaa P2P file- sharing.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
NETWORK SECURITY.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Private key
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
and File Security With GnuPG Matt Brodeur
Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0
Key management issues in PGP
Unit 3 Section 6.4: Internet Security
Public Key Infrastructure
Pooja programmer,cse department
ELECTRONIC MAIL SECURITY
An Installation Guide of PGP on Windows 2000
ELECTRONIC MAIL SECURITY
Digital Certificates and X.509
The Secure Sockets Layer (SSL) Protocol
Chapter 4 Cryptography / Encryption
ONLINE SECURE DATA SERVICE
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Why Johnny Can’t Encrypt A Usability Evaluation of GPG 5.0 Presented by Yin Shi

Overview  Introduction  Understanding the Problem  Cognitive Walkthrough  User Test  Conclusion

Introduction  Effective security requires a different usability standard  Security mechanisms are effective only when used correctly –Matt Bishop claimed that configuration errors are the cause of more than 90% of all computer security failures  Making security usable will require the development of domain-specific user interface design principles and techniques  Choose PGP 5.0 for our case study –Designed by general consumer software standards –“Significantly improved graphical user interface makes complex mathematical cryptograph accessible for novice computer users.”

Understanding the Problem  Defining Usability for Security –Definition: Security software is usable if the people who are expected to use it:  Are reliably made aware of the security tasks they need to perform  Are able to figure out how to successfully perform those tasks  Don’t make dangerous errors  Are sufficiently comfortable with the interface to continue using it

Understanding the Problem  Problematic Properties of Security –Five inherent properties of security  The unmotivated user property  The abstraction property  The lack of feedback property  The barn door property  The weakest link Property  A Usability Standard for PGP –Need for privacy and authentication –What needs to be done –How to do it and avoid dangerous errors

Evaluation Methods  Two Methods –An informal cognitive walkthrough –A user test performed in a laboratory

Cognitive Walkthrough  Visual Metaphors (keys) –PGP’s user interface relies on graphical depictions of keys and locks –Improvements  An extension of the metaphor to distinguish public keys for encryption and private keys for decryption  Different icons for public and private keys

Cognitive Walkthrough  Visual Metaphors (signatures) –The icon of the blue quill pen is used to indicate signing is problematic –Quill pen icon will not help user understand they need to use their private keys to generate signatures –Improvements  Keep quill pen to represent signing, but modify it to show a private key as the nib of the pen  Use some entirely different icon for signatures

Cognitive Walkthrough  Different Key Types –Originally, PGP used the RSA algorithm for encryption and signing –PGP 5.0 uses the Diffie-Hellman/DSS algorithm –PGP 5.0 can handle RSA keys, but other version PGP can’t handle DSS keys –Lack of forward compatibility  Recipients with RSA keys can’t decrypt it  Recipients with RSA keys can’t verify signatures –PGP 5.0 alerts its users to this compatibility issues in two ways

Cognitive Walkthrough  Different Key Types –Uses different icons to depict the different key types –When user attempt to encrypt documents using mixed key types, a warning message is showed –Improvement  Double-clicking on a key pops up a Key properties window

Cognitive Walkthrough  Metaphor of choosing people  Human icons obscure the key type information  Better to display multiple keys that person owns

Cognitive Walkthrough  Key Server –Are publicly accessible databases –PGP offers three key server operations under the Keys pull-down menu

Cognitive Walkthrough  Problems with the presentation of the Key Server –Users may not realize that it exists  No representation of it in the top level of PGPkeys display –PGPkeys keeps no records of key server access –PGP’s key revocation operation does not send the resulting revocation certificate to the key server

Cognitive Walkthrough  Key Management Policy –Two ratings for each public key  Validity – how sure the user is that the key is safe to encrypt with  Trust – how much faith the user has in the key –May not realize PGP can automatically sets the validity rating of a key based on whether it has been signed by a certain number of sufficiently trusted keys.

Cognitive Walkthrough  Irreversible Actions –Accidentally deleting the private key –Accidentally publicizing a key –Accidentally revoking a key –Forgetting the passphrase –Failing to back up the key rings  Consistency –encoding  Too Much Information –PGPkeys application presents the user with too much information to make sense of  Owner’s name, validity, trust level, creation date, and size  Nothing to help the user figure out which parts of the display are the most important to pay attention to

User Test  Test Design  Initial task is to send the secret message to the team members in a signed and encrypted  Main steps –Generate a key pair, get the public keys –Make their own public key available to team members –Type the secret message into an s –Sign the using private key, encrypt the using the team member’s public keys

User Test  One of the member had an RSA key  Participant would encounter mixed key types warning message  Each of the five campaign members was represented by a dummy account and a key pair: –These were accessible to the test monitor through a network laptop  The test monitor could send to the participant from the appropriate dummy account

User Test (Results)  Avoiding dangerous errors –Three of them accidentally ed the secret without encryption –One forgot her passphrase  Figuring out how to encrypt with any key –One couldn’t figure out how to encrypt at all –A reconfiguration of PGP may required –Another one kept sending unencrypted test messages, and finally succeeded after being prompted to use the PGP plug in buttons

User Test (Results)  Figuring out the correct key to encrypt with –11 participants figured out how to encrypt, but failed to understand the public key model –Another one so completely misunderstood the model that he generated key pairs for each team member rather than for himself  Decrypting an message –Five participants received encrypted –One can’t figure how to decrypt it –Two took a very hard time to figure it out –Other two were able to decrypt without any problem

User Test (Results)  Publishing the public key –Ten could make their public key available to the team members –Two never addressed key distribution –Those ten, five sent their keys to key server –Three ed to the team members –Other two did both  Getting other people’s public keys –Eight successfully got the team members’ public keys –The others either never seemed aware they need other people’s public key, or they did know how to get it

User Test (Results)  Handing the mixed key types problem –Only four managed to send encrypted correctly –One didn’t have mixed key types problem –The other three received a reply for complaining that they couldn’t decrypt  Signing an message  Verifying a signature on an message  Creating a backup revocation certificate –Only three participants managed to successfully send encrypted and decrypt a reply –In response to direct prompting for backup  One didn’t send the key pair to the key server  One sent to the campaign manager  One simply ignored the prompt

User Test (Results)  Deciding whether to trust keys from the key server –Of the eight participants, only three expressed some concern over if they should trust the keys –None of the three made use of the validity and trust labeling provided by PGPKeys

Conclusion/Questions  PGP 5.0’s user interface does not come even reasonably close to achieving our usability standard  It does not make public key encryption of electronic mail manageable for average computer users  Public work on usability evaluation in a security context would be extremely valuable  We expect to find better design strategies