Involving humans in the cryptographic loop: Introduction and threat analysis of EEVEHAC

Julius Hekkala, Sara Nikula, Outi Marja Latvala, Kimmo Halunen

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

1 Citation (Scopus)

Abstract

Our digital lives rely on modern cryptography that is based on complicated mathematics average human users cannot follow. Previous attempts at adding the human user into the cryptographic loop include things like Human Authenticated Key Exchange and visualizable cryptography. This paper presents our proof-of-concept implementation of these ideas as a system called EEVEHAC. It utilizes human capabilities to achieve an end-to-end encrypted channel between a user and a server that is authenticated with human senses and can be used through untrusted environments. The security of this complete system is analyzed. We find that the combination of the two different systems into EEVEHAC on a theoretical level retains the security of the individual systems. We also identify the weaknesses of this implementation and discuss options for overcoming them.

Original languageEnglish
Title of host publicationProceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021
EditorsSabrina De Capitani di Vimercati, Pierangela Samarati
PublisherSciTePress
Pages659-664
Number of pages6
ISBN (Electronic)978-989-758-524-1
DOIs
Publication statusPublished - 2021
MoE publication typeA4 Article in a conference publication
Event18th International Conference on Security and Cryptography, SECRYPT 2021 - Virtual, Online
Duration: 6 Jul 20218 Jul 2021

Conference

Conference18th International Conference on Security and Cryptography, SECRYPT 2021
CityVirtual, Online
Period6/07/218/07/21

Keywords

  • Human Understandable Cryptography
  • Narrative Authentication
  • Secure Channel
  • Visualizable Cryptography

Fingerprint

Dive into the research topics of 'Involving humans in the cryptographic loop: Introduction and threat analysis of EEVEHAC'. Together they form a unique fingerprint.

Cite this