Visible to the public Can Unicorns Help Users Compare Crypto Key Fingerprints?Conflict Detection Enabled

TitleCan Unicorns Help Users Compare Crypto Key Fingerprints?
Publication TypeConference Proceedings
Year of Publication2017
AuthorsJoshua Tan, Lujo Bauer, Joseph Bonneau, Lorrie Cranor, Jeremy Thomas, Blase Ur
Conference NameCHI '17 Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems
Date Published05/2017
PublisherACM New York, NY, USA ©2017
Conference LocationDenver, CO
ISBN978-1-4503-4655-9
KeywordsAugust'17, CMU, Human Behavior, usability; key fingerprints; authentication; secure messaging, USE: User Security Behavior
Abstract

Many authentication schemes ask users to manually compare compact representations of cryptographic keys, known as fingerprints. If the fingerprints do not match, that may signal a man-in-the-middle attack. An adversary performing an attack may use a fingerprint that is similar to the target fingerprint, but not an exact match, to try to fool inattentive users. Fingerprint representations should thus be both usable and secure. We tested the usability and security of eight fingerprint representations under different configurations. In a 661-participant between-subjects experiment, participants compared fingerprints under realistic conditions and were subjected to a simulated attack. The best configuration allowed attacks to succeed 6% of the time; the worst 72%. We find the seemingly effective compare-and-select approach performs poorly for key fingerprints and that graphical fingerprint representations, while intuitive and fast, vary in performance. We identify some fingerprint representations as particularly promising.

DOI10.1145/3025453.3025733
Citation Keynode-36400

Other available formats:

Tan_Unicorns_LC.pdf
AttachmentSize
bytes