Usability Studies Email Encryption Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech.

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Operating System Security
With your instructor, Jeremy Hyland
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Public Key Management and X.509 Certificates
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy and Trust Frameworks/Systems Presented by Zalia Shams Usable Security –
Caleb Stepanian, Cindy Rogers, Nilesh Patel
Pretty Good Privacy (PGP). How PGP works PGP uses both public-key cryptography and symmetric key cryptography, and includes a system which binds the public.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Zero effort security for the home PC users? By Terje Risa.
Secure Communications … or, the usability of PKI.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Cryptographic Technologies
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
Security Jonathan Calazan December 12, 2005.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Why Johnny Can’t Encrypt A Usability Evaluation of GPG 5.0 Presented by Yin Shi.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Electronic Mail Security
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Secure Electronic Transaction (SET)
Masud Hasan Secue VS Hushmail Project 2.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
Usability Evaluation June 8, Why do we need to do usability evaluation?
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Compliance Defects in Public- key Cryptography “ A public-key security system trusts its users to validate each others’s public keys rigorously and to.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Designing for Privacy Human factors and system’s engineering Usable Security – CS.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Fall 2006CS 395: Computer Security1 Key Management.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
1 CNLab/University of Ulsan Chapter 16 Electronic Mail Security  PGP (Pretty Good Privacy)  S/MIME.
Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0
Key management issues in PGP
Web Applications Security Cryptography 1
Security Outline Encryption Algorithms Authentication Protocols
Cryptography and Network Security
CS 465 Secure Last Updated: Nov 30, 2017.
IS3230 Access Security Unit 9 PKI and Encryption
Message Digest Cryptographic checksum One-way function Relevance
Advanced Computer Networks
Presentation transcript:

Usability Studies Encryption Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Usability evaluation of PGP 5.0 Defines a standard of usable security Evaluated PGP 5.0 Using  Direct evaluation (cognitive walkthrough)  User experiments Conclusions:  PGP 5.0 does not meet the usability security standard  Confirms hypothesis that “security-specific user interface design principles and techniques are needed.” Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Usable Security standard Definition: Security software is usable if the people who are expected to use it: 1. are reliably made aware of the security tasks they need to perform; 2. are able to figure out how to successfully perform those tasks; 3. don’t make dangerous errors; and 4. are sufficiently comfortable with the interface to continue using it.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Design differences Designing for security has unique challenges that must be accounted for in designing for usability: Unmotivated user (security is a secondary goal) Abstraction (policies/rules are unintuitive to general population) Feedback (security state is complex and difficult to depict) “barn door” (cannot make serious mistakes) “weakest link” (must attend to all aspects of security; cannot learn/manage incrementally as with other software)

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Walkthrough evaluation Metaphor issues  Keys: a different key is used for encryption than for decryption unlike a single “real” key which does both  Signature: not clear that signing (quill pen icon) requires the use of the private key  Key types: distinction between RSA keys (blue) and Diffie-Hellman (brass) not clear

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Walkthrough evaluation Key management issues  Key server: no top-level visibility; not identified as a remote operation; no history of access  Key rating: Validity (completely, marginally, invalid) – degree of confidence that key belongs to given user Trust (completely, marginally, untrusted) – degree of confidence in another user as certifier of keys Assigned automatically Problems  User may assign now meaning to “validity” and “trust”  Automatic assignment not visible

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Walkthrough evaluation Reversibility:  Insufficient notice (e.g., deleting the private key)  Insufficient guidance on what actions are need to undo the effects of an otherwise irreversible operation (accidental key revocation) Consistency (terminology: “encode” vs. “encrypt”) Too much information (does not separate information relevant to novice vs. advanced users)

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech User experiment Task: send sensitive political campaign information via encrypted to five others. Participants: 12, proficiency, security novices Results:  only 1/3 rd of the subjects were able to complete the task in 90 minutes  1/4 th of the subjects accidentally exposed the sensitive information  Subjects’ difficulties stemmed from inadequate understanding of the public-key model

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech encryption redux Repeats Whitten/Tygar experiments with 43 crypto- naïve users Uses newer systems (S/MIME) in combination with Key Continuity Management (KCM) Claims/Results:  Less secure (in principle) but more usable (in practice)  Better interfaces needed for a specific situation

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech S/MIME and KCM S/MIME  Automatically attaches certificate (with public key) of user whose private key encrypted (signs) outgoing  Automatically decrypts received which has an attached certificate and stores certificate in address book  Obtaining a certificate is still difficult (requires trusted third party, certificate chains) KCM  Ignore certificate chains (“users are on their own”); directly associate identity in certificate with public key in certificate for purposes  Notify user if public key changes for that identity  Tradeoff: less secure but more usable and scalable  Added to Eudora mail client via CoPilot

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Attacks and Feedback Anticipated attacks  New key attack (trust which has a key different from one seen previously?)  New identity attack (trust new key and new identity)?  Unsigned message attack (trust unsigned message from known source) Feedback (message border color-coded)  Red (message contains new key from known identity)  Yellow (first signed message from identity)  Green (current message signed with known key)  Gray (unsigned message from identity with known key)  White (unsigned message from unknown identity)

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Experiment Three groups  No KCM  KCM  KCM + briefing Results  KCM help users to resist attacks  Users were able to explain signing and sealing in follow-up interviews, however…  KCM users are less likely to encrypt message than those without KCM (apparently not understanding the difference between sealing and signing despite results of interviews)

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Attack Types KCM more successful against new key attack and unsigned message attacks KCM not more successful against new identity attack

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Reflections To what extent is “technology” the answer? (What is the difference between the user performance in the two experiments?) Does usability engineering for security require a different set of methods/tools? Is a tradeoff between security and usability required (as suggested in the use of KCM)? Importance of repeatability. Utility of an experimental framework (the “Johnny2 Experimenter’s Workbench”).