Involving humans in the cryptographic loop: Introduction and threat analysis of EEVEHAC

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Abstract

    Our digital lives rely on modern cryptography that is based on complicated mathematics average human users cannot follow. Previous attempts at adding the human user into the cryptographic loop include things like Human Authenticated Key Exchange and visualizable cryptography. This paper presents our proof-of-concept implementation of these ideas as a system called EEVEHAC. It utilizes human capabilities to achieve an end-to-end encrypted channel between a user and a server that is authenticated with human senses and can be used through untrusted environments. The security of this complete system is analyzed. We find that the combination of the two different systems into EEVEHAC on a theoretical level retains the security of the individual systems. We also identify the weaknesses of this implementation and discuss options for overcoming them.

    Original languageEnglish
    Title of host publicationProceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021
    EditorsSabrina De Capitani di Vimercati, Pierangela Samarati
    PublisherSciTePress
    Pages659-664
    Number of pages6
    ISBN (Electronic)978-989-758-524-1
    DOIs
    Publication statusPublished - 2021
    MoE publication typeA4 Article in a conference publication
    Event18th International Conference on Security and Cryptography, SECRYPT 2021 - Virtual, Online
    Duration: 6 Jul 20218 Jul 2021

    Conference

    Conference18th International Conference on Security and Cryptography, SECRYPT 2021
    CityVirtual, Online
    Period6/07/218/07/21

    Keywords

    • Human Understandable Cryptography
    • Narrative Authentication
    • Secure Channel
    • Visualizable Cryptography

    Fingerprint

    Dive into the research topics of 'Involving humans in the cryptographic loop: Introduction and threat analysis of EEVEHAC'. Together they form a unique fingerprint.

    Cite this