IKM-based Security Usability Enhancement Model

Today by growth of hardware and software technologies new developed products are delivering more facilities while their security configuration is becoming more and more complicated. Security configuration of network-based products is not comprehensible for every user and therefore degrades system usability dramatically. IKM is a cryptographic key management framework which empowers end-user systems to generate keys for preserving security while it also has potential of usability enhancement particularly for network-based products. This paper describes background of security usability, IKM key management framework, and proposes a new method for using IKM to deliver security and usability features for designed network-based systems. In last section delivered security and usability of proposed model is evaluated based on cryptographic key-strength analysis and usability questionnaire.

[1]  Simson L. Garfinkel,et al.  Design principles and patterns for computer systems that are simultaneously secure and usable , 2005 .

[2]  Sig Porter,et al.  A password extension for improved human factors , 1982, Comput. Secur..

[3]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[4]  Nasir D. Memon,et al.  Authentication using graphical passwords: effects of tolerance and image choice , 2005, SOUPS '05.

[5]  Mary Ellen Zurko,et al.  User-centered security , 1996, NSPW '96.

[6]  Adrian Perrig,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Déjà Vu: A User Study Using Images for Authentication , 2000 .

[7]  Hossein Rouhani Zeidanloo,et al.  Node Based Interpretative Key Management Framework , 2010, Security and Management.

[8]  Mazdak Zamani,et al.  Security Features Comparison of Master Key and IKM Cryptographic Key Management for Researchers and Developers , 2011 .

[9]  Moshe Zviran,et al.  Cognitive passwords: The key to easy access control , 1990, Comput. Secur..

[10]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.

[11]  Sacha Brostoff,et al.  Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .

[12]  M. Angela Sasse,et al.  Are Passfaces More Usable Than Passwords? A Field Trial Investigation , 2000, BCS HCI.

[13]  Hossein Rouhani Zeidanloo,et al.  Interpretative Key Management (IKM), A Novel Framework , 2010, 2010 Second International Conference on Computer Research and Development.

[14]  Saman Shojae Chaeikar,et al.  Comparative Analysis of Master-Key and Interpretative Key Management (IKM) Frameworks , 2012 .