Security ceremonies : including humans in cryptographic protocols

Whether by using electronic banking, by using credit cards, or by synchronising a mobile telephone via Bluetooth to an in-car system, humans are a critical part in many cryptographic protocols daily. We reduced the gap that exists between the theory and the reality of the security of these cryptographic protocols involving humans, by creating tools and techniques for proofs and implementations of human-followable security. After three human research studies, we present a model for capturing human recognition; we provide a tool for generating values called Computer-HUman Recognisable Nonces (CHURNs); and we provide a model for capturing human perceptible freshness.

[1]  Ari Juels,et al.  Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.

[2]  Manuel Blum,et al.  Secure Human Identification Protocols , 2001, ASIACRYPT.

[3]  David Ma,et al.  Does domain highlighting help people identify phishing sites? , 2011, CHI.

[4]  Ian H. Witten,et al.  Arithmetic coding revisited , 1998, TOIS.

[5]  Mike Bond,et al.  2010 IEEE Symposium on Security and Privacy Chip and PIN is Broken , 2022 .

[6]  Serge Vaudenay,et al.  Secure Communications over Insecure Channels Based on Short Authenticated Strings , 2005, CRYPTO.

[7]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[8]  Berk Sunar,et al.  PUF-HB: A Tamper-Resilient HB Based Authentication Protocol , 2008, ACNS.

[9]  Tone Bratteteig,et al.  Disentangling power and decision-making in participatory design , 2012, PDC '12.

[10]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[11]  Jungwon Lee,et al.  What makes Internet users visit cyber stores again? key design factors for customer loyalty , 2000, CHI.

[12]  Martín Abadi,et al.  Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..

[13]  A. Darwish,et al.  Eye tracking analysis of browser security indicators , 2012, 2012 International Conference on Computer Systems and Industrial Informatics.

[14]  Serge Egelman,et al.  It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions , 2009, IEEE Symposium on Security and Privacy.

[15]  Alexander De Luca,et al.  Shining Chrome: Using Web Browser Personas to Enhance SSL Certificate Visualization , 2011, INTERACT.

[16]  Sacha Brostoff,et al.  Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .

[17]  D. Koehn The Nature of and Conditions for Online Trust , 2003 .

[18]  Colin Boyd,et al.  Protocols for Key Establishment and Authentication , 2003 .

[19]  Alexander W. Dent A Note On Game-Hopping Proofs , 2006, IACR Cryptol. ePrint Arch..

[20]  Paul Dourish,et al.  What we talk about when we talk about context , 2004, Personal and Ubiquitous Computing.

[21]  Matti Tedre,et al.  Science of the Artificial , 2014 .

[22]  Mihir Bellare,et al.  Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.

[23]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[24]  Ann Blandford,et al.  Detecting Cognitive Causes of Confidentiality Leaks , 2007, FMIS@ICFEM.

[25]  Kenneth G. Paterson,et al.  Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol , 2011, ASIACRYPT.

[26]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[27]  Adam Shostack,et al.  The New School of Information Security , 2008 .

[28]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[29]  Tibor Jager,et al.  On the Security of TLS-DHE in the Standard Model , 2012, CRYPTO.

[30]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[31]  Richard W. Hamming,et al.  Error detecting and error correcting codes , 1950 .

[32]  Ka-Ping Yee Secure Interaction Design and the Principle of Least Authority , 2003 .

[33]  Stuart E. Schechter,et al.  The Emperor's New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies † , 2007 .

[34]  Ran Canetti,et al.  POSH: a generalized captcha with security applications , 2008, AISec '08.

[35]  L. Jean Camp,et al.  Mental Models of Security Risks , 2007, Financial Cryptography.

[36]  Marie Christine Roy,et al.  The impact of interface usability on trust in Web retailers , 2001, Internet Res..

[37]  Nitesh Saxena,et al.  Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns , 2008, ACNS.

[38]  Colin Boyd,et al.  On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited , 2004, SCN.

[39]  Jörg Schwenk,et al.  User-aware provably secure protocols for browser-based mutual authentication , 2009, Int. J. Appl. Cryptogr..

[40]  Collin Jackson,et al.  Forcehttps: protecting high-security web sites from network attacks , 2008, WWW.

[41]  Mihir Bellare,et al.  Entity Authentication and Key Distribution , 1993, CRYPTO.

[42]  Joseph Bonneau,et al.  What's in a Name? , 2020, Financial Cryptography.

[43]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[44]  Julien Bringer,et al.  HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).

[45]  Alain Forget,et al.  User interface design affects security: patterns in click-based graphical passwords , 2009, International Journal of Information Security.

[46]  Glen G. Langdon,et al.  An Introduction to Arithmetic Coding , 1984, IBM J. Res. Dev..

[47]  P. Liamputtong Qualitative data analysis: conceptual and practical considerations. , 2009, Health promotion journal of Australia : official journal of Australian Association of Health Promotion Professionals.

[48]  M. Angela Sasse,et al.  Users are not the enemy , 1999, CACM.

[49]  Phoebe Sengers,et al.  The Three Paradigms of HCI , 2007 .

[50]  Margot Brereton,et al.  Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing , 2011, INTERACT.

[51]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[52]  Cliff Lampe,et al.  A face(book) in the crowd: social Searching vs. social browsing , 2006, CSCW '06.

[53]  Richard Mollin Codes: The Guide to Secrecy From Ancient to Modern Times , 2005 .

[54]  Emmanuel Aroms,et al.  NIST Special Publication 800-63 Electronic Authentication Guideline , 2012 .

[55]  Karen Holtzblatt,et al.  Contextual design: using customer work models to drive systems design , 1996, CHI Extended Abstracts.

[56]  Arun Kumar,et al.  Article in Press Pervasive and Mobile Computing ( ) – Pervasive and Mobile Computing a Comparative Study of Secure Device Pairing Methods , 2022 .

[57]  Adam Bender,et al.  Review of "Codes: The Guide to Secrecy from Ancient to Modern Times by Richard A. Mollin", Chapman & Hall/CRC, 2005 , 2006, SIGA.

[58]  Paul Dourish,et al.  Beyond the user: use and non-use in HCI , 2009, OZCHI.

[59]  Robert Biddle,et al.  Even Experts Deserve Usable Security: Design guidelines for security management systems , 2007 .

[60]  Serge Egelman,et al.  It's No Secret. Measuring the Security and Reliability of Authentication via “Secret” Questions , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[61]  Ann Blandford,et al.  Modelling and analysing cognitive causes of security breaches , 2008, Innovations in Systems and Software Engineering.

[62]  Steven J. Murdoch,et al.  Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication , 2010, Financial Cryptography.

[63]  Angela Sasse,et al.  Humans in the Loop Human – Computer Interaction and Security , 2022 .

[64]  Serge Vaudenay,et al.  SAS-Based Authenticated Key Agreement , 2006, Public Key Cryptography.

[65]  Paul Dourish,et al.  Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena , 2006, Hum. Comput. Interact..

[66]  J. Doug Tygar,et al.  The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.

[67]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[68]  Ka-Ping Yee,et al.  Aligning Security and Usability , 2004, IEEE Secur. Priv..

[69]  Andrew S. Patrick,et al.  HCI and security systems , 2003, CHI Extended Abstracts.

[70]  Andrew Chi-Chih Yao,et al.  Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.

[71]  J. Doug Tygar,et al.  Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks , 2005, HIP.

[72]  Dianne Cyr,et al.  Modeling Web Site Design Across Cultures: Relationships to Trust, Satisfaction, and E-Loyalty , 2008, J. Manag. Inf. Syst..

[73]  Margot Brereton,et al.  Towards a Secure Human-and-Computer Mutual Authentication Protocol , 2012, AISC.

[74]  Margot Brereton,et al.  Interaction, privacy and profiling considerations in local mobile social software: a prototype agile ride share system , 2010, OZCHI '10.

[75]  Colin Potts,et al.  Design of Everyday Things , 1988 .

[76]  Min Wu,et al.  Do security toolbars actually prevent phishing attacks? , 2006, CHI.

[77]  Lorrie Faith Cranor,et al.  Improving Computer Security Dialogs , 2011, INTERACT.

[78]  M. Helander,et al.  Affective design of E-commerce user interfaces: how to maximise perceived trustworthiness , 2001 .

[79]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[80]  Victor Shoup,et al.  Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..

[81]  Lucy Suchman,et al.  Human-Machine Reconfigurations: Plans and Situated Actions , 2006 .

[82]  Abraham Lempel,et al.  A universal algorithm for sequential data compression , 1977, IEEE Trans. Inf. Theory.

[83]  Margot Brereton,et al.  How HCI design influences web security decisions , 2010, OZCHI '10.

[84]  Kirstie Hawkey,et al.  Revealing hidden context: improving mental models of personal firewall users , 2009, SOUPS.

[85]  Nicholas Bohm,et al.  Electronic Commerce: Who Carries the Risk of Fraud? , 2000, J. Inf. Law Technol..

[86]  Charles J. Kacmar,et al.  The impact of initial consumer trust on intentions to transact with a web site: a trust building model , 2002, J. Strateg. Inf. Syst..

[87]  Stefan Dziembowski How to Pair with a Human , 2010, SCN.

[88]  David A. Wagner,et al.  Conditioned-safe ceremonies and a user study of an application to web authentication , 2009, NDSS.

[89]  Jean Everson Martina,et al.  An updated threat model for security ceremonies , 2013, SAC '13.

[90]  P. Liamputtong,et al.  Qualitative Research Methods 2nd ed , 2005 .

[91]  Moti Yung,et al.  Fourth-factor authentication: somebody you know , 2006, CCS '06.

[92]  Karen Holtzblatt,et al.  Contextual design , 1997, INTR.

[93]  Sebastian Günther Folk Models of Home Computer Security , 2012 .

[94]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[95]  Carl M. Ellison,et al.  Public-key support for group collaboration , 2003, TSEC.

[96]  Cormac Herley,et al.  So long, and no thanks for the externalities: the rational rejection of security advice by users , 2009, NSPW '09.

[97]  Amir Herzberg,et al.  Why Johnny can't surf (safely)? Attacks and defenses for web users , 2009, Comput. Secur..

[98]  Herbert A. Simon,et al.  The Sciences of the Artificial , 1970 .

[99]  Jean Everson Martina,et al.  Ceremonies Formal Analysis in PKI's Context , 2009, 2009 International Conference on Computational Science and Engineering.

[100]  Kat Krol,et al.  Don't work. Can't work? Why it's time to rethink security warnings , 2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS).

[101]  Carl M. Ellison,et al.  Ceremony Design and Analysis , 2007, IACR Cryptol. ePrint Arch..

[102]  A. Strauss,et al.  The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .

[103]  Detmar W. Straub,et al.  The Relative Importance of Perceived Ease of Use in IS Adoption: A Study of E-Commerce Adoption , 2000, J. Assoc. Inf. Syst..

[104]  Mihir Bellare,et al.  Practice-Oriented Provable Security , 1998, Lectures on Data Security.

[105]  Giovanni Maria Sacco,et al.  Timestamps in key distribution protocols , 1981, CACM.

[106]  Manuel Blum,et al.  How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[107]  Margot Brereton,et al.  Ceremony Analysis: Strengths and Weaknesses , 2011, SEC.

[108]  Lorrie Faith Cranor,et al.  Bridging the Gap in Computer Security Warnings: A Mental Model Approach , 2011, IEEE Security & Privacy.

[109]  Donald Ervin Knuth,et al.  The Art of Computer Programming, 2nd Ed. (Addison-Wesley Series in Computer Science and Information , 1978 .

[110]  Claude E. Shannon,et al.  The Mathematical Theory of Communication , 1950 .

[111]  Colin Boyd,et al.  Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.

[112]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[113]  Kirstie Hawkey,et al.  "I did it because I trusted you" : Challenges with the Study Environment Biasing Participant Behaviours , 2010 .

[114]  Sameer Patil,et al.  Who gets to know what when: configuring privacy permissions in an awareness application , 2005, CHI.

[115]  Ahmad-Reza Sadeghi,et al.  Provably secure browser-based user-aware mutual authentication over TLS , 2008, ASIACCS '08.

[116]  Giampaolo Bella,et al.  Formal Correctness of Security Protocols , 2007 .

[117]  Sandeep Dayal,et al.  How to Build Trust Online , 2003 .

[118]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[119]  Yong Liu,et al.  Do I Do What I Say?: Observed Versus Stated Privacy Preferences , 2007, INTERACT.

[120]  Amir Herzberg,et al.  Security and identification indicators for browsers against spoofing and phishing attacks , 2008, TOIT.

[121]  Dongwan Shin,et al.  Supporting visual security cues for WebView-based Android apps , 2013, SAC '13.