Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1073001.1073003acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

Johnny 2: a user test of key continuity management with S/MIME and Outlook Express

Published: 06 July 2005 Publication History

Abstract

Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificates. Key continuity management (KCM) has been proposed as a way to lower these barriers to adoption, by making key generation, key management, and message signing essentially automatic. We present the first user study of KCM-secured email, conducted on naïve users who had no previous experience with secure email. Our secure email prototype, CoPilot, color-codes messages depending on whether they were signed and whether the signer was previously known or unknown. This interface makes users signicantly less susceptible to social engineering attacks overall, but new-identity attacks (from email addresses never seen before) are still effective. Also, naïve users do use the Sign and Encrypt button on the Outlook Express toolbar when the situation seems to warrant it, even without explicit instruction, although some falsely hoped that Encrypt would protect a secret message even when sent directly to an attacker. We conclude that KCM is a workable model for improving email security today, but work is needed to alert users to "phishing" attacks.

References

[1]
Whitfield Diffie and Martin E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644--654, 1976.
[2]
Simson L. Garfinkel. Email-based identification and authentication: An alternative to PKI? Security & Privacy Magazine, 1:20--26, Nov. - Dec. 2003.
[3]
Simson L. Garfinkel. Enabling email confidentiality through the use of opportunistic encryption. In The 2003 National Conference on Digital Government Research. National Science Foundation, 2003.
[4]
Simson L. Garfinkel, Jeffrey I. Schiller, Erik Nordlander, David Margrave, and Robert C. Miller. Views, reactions, and impact of digitally-signed mail in e-commerce. In Financial Cryptography and Data Security 2005. Springer Verlag, 2005. To Appear.
[5]
Peter Gutmann. Why isn't the Internet secure yet, dammit. In AusCERT Asia Pacific Information Technology Security Conference 2004; Computer Security: Are we there yet? AusCERT, May 2004.
[6]
Loren M. Kohnfelder. Towards a practical public-key cryptosystem. PhD thesis, MIT, Cambridge, MA, May 1978. Undergraduate thesis supervised by L. Adleman.
[7]
Kevin D. Mitnick and William L. Simon. The Art of Deception. John Wiley & Sons, 2002.
[8]
B. Ramsdell. RFC 3851: Secure/multipurpose Internet mail extensions (S/MIME) version 3.1 message specification, July 2004.
[9]
Frank Stajano and Ross Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In 1999 AT&T Software Symposium, pages 172--194. AT&T, September 15 1999.
[10]
TechSmith. Camtasia studio, 2005.
[11]
Thawte Consulting. Certification practices statement version 2.1, January 9 2004.
[12]
Alma Whitten. Making Security Usable. PhD thesis, School of Computer Science, Carnegie Mellon University, 2004.
[13]
Alma Whitten. Personal communication, December 6 2004.
[14]
Alma Whitten and J. D. Tygar. Usability of security: A case study. Technical report, Carnegie Mellon University, December 1998.
[15]
Alma Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium, pages 169 -- 184. Usenix, 1999.
[16]
T. Ylonen. SSH - secure login connections over the Internet. In Proceedings of the 6th Security Symposium) (USENIX Association: Berkeley, CA), page 37. Usenix, 1996.

Cited By

View all
  • (2023)Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-WalletsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623218(3153-3167)Online publication date: 15-Nov-2023
  • (2022)SigstoreProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560596(2353-2367)Online publication date: 7-Nov-2022
  • (2022)27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833755(860-875)Online publication date: May-2022
  • Show More Cited By

Index Terms

  1. Johnny 2: a user test of key continuity management with S/MIME and Outlook Express

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and security
      July 2005
      123 pages
      ISBN:1595931783
      DOI:10.1145/1073001
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 06 July 2005

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Usability
      2. e-commerce
      3. user interaction design
      4. user studies

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate 15 of 49 submissions, 31%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)31
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 12 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-WalletsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623218(3153-3167)Online publication date: 15-Nov-2023
      • (2022)SigstoreProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560596(2353-2367)Online publication date: 7-Nov-2022
      • (2022)27 Years and 81 Million Opportunities Later: Investigating the Use of Email Encryption for an Entire University2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833755(860-875)Online publication date: May-2022
      • (2022)Email Security: S/MIMEGuide to Internet Cryptography10.1007/978-3-031-19439-9_17(401-430)Online publication date: 26-Nov-2022
      • (2022)Work in Progress: Can Johnny Encrypt E-Mails on Smartphones?Socio-Technical Aspects in Security10.1007/978-3-031-10183-0_9(182-193)Online publication date: 14-Jul-2022
      • (2021)Usability of End-to-End Encryption in E-Mail CommunicationFrontiers in Big Data10.3389/fdata.2021.5682844Online publication date: 14-Jul-2021
      • (2021)User Perceptions of Gmail’s Confidential ModeProceedings on Privacy Enhancing Technologies10.2478/popets-2022-00102022:1(187-206)Online publication date: 20-Nov-2021
      • (2021)The Motivated Can Encrypt (Even with PGP)Proceedings on Privacy Enhancing Technologies10.2478/popets-2021-00372021:3(49-69)Online publication date: 27-Apr-2021
      • (2021)Let’s Create! Automated Certificate Management for End-users2021 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)10.23919/SoftCOM52868.2021.9559103(1-6s)Online publication date: 23-Sep-2021
      • (2021)From Secure to Military-GradeProceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society10.1145/3463676.3485602(119-135)Online publication date: 15-Nov-2021
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media