scispace - formally typeset
Open AccessProceedings Article

Why Johnny can't encrypt: a usability evaluation of PGP 5.0

TLDR
It is concluded that PGP 5.0 is not usable enough to provide effective security for most computer users, despite its attractive graphical user interface, supporting the hypothesis that user interface design for effective security remains an open problem.
Abstract
User errors cause or contribute to most computer security failures, yet user interfaces for security still tend to be clumsy, confusing, or near-nonexistent. Is this simply due to a failure to apply standard user interface design techniques to security? We argue that, on the contrary, effective security requires a different usability standard, and that it will not be achieved through the user interface design techniques appropriate to other types of consumer software. To test this hypothesis, we performed a case study of a security program which does have a good user interface by general standards: PGP 5.0. Our case study used a cognitive walkthrough analysis together with a laboratory user test to evaluate whether PGP 5.0 can be successfully used by cryptography novices to achieve effective electronic mail security. The analysis found a number of user interface design flaws that may contribute to security failures, and the user test demonstrated that when our test participants were given 90 minutes in which to sign and encrypt a message using PGP 5.0, the majority of them were unable to do so successfully. We conclude that PGP 5.0 is not usable enough to provide effective security for most computer users, despite its attractive graphical user interface, supporting our hypothesis that user interface design for effective security remains an open problem. We close with a brief description of our continuing work on the development and application of user interface design principles and techniques for security.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Security Engineering: A Guide to Building Dependable Distributed Systems

TL;DR: In almost 600 pages of riveting detail, Ross Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables.
Book

Information Hiding Techniques for Steganography and Digital Watermarking

TL;DR: This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia and an overview of "steganalysis," methods which can be used to break steganographic communication are discussed.

Named Data Networking (NDN) Project

TL;DR: A global center for commercial innovation, PARC, a Xerox company, works closely with enterprises, entrepreneurs, government program partners and other clients to discover, develop, and deliver new business opportunities.
Proceedings Article

Déjà Vu: a user study using images for authentication

TL;DR: Deja Vu is a recognition-based authentication system, which authenticates a user through her ability to recognize previously seen images, which is more reliable and easier to use than traditional recall-based schemes, which require the user to precisely recall passwords or PINs.
Journal ArticleDOI

Safeware: System Safety and Computers

TL;DR: Will Tracz, the esteemed editor and Used-Program salesman, has written an entertaining, non-technical book dealing with the practice (and lack of) of software reuse.
References
More filters
Book

Safeware: System Safety and Computers

TL;DR: This chapter discusses the role of humans in Automated Systems, the nature of risk, and elements of a Safeware Program, which aims to manage Safety and Security through design and implementation.
Book

Heuristic evaluation

Jakob Nielsen
TL;DR: This chapter discusses heuristic evaluation, which Inspection of a prototype or finished system to identify all changes necessary to optimize human performance and preference.
Book

Handbook of Usability Testing: How to Plan, Design, and Conduct Effective Tests

Jeffrey Rubin
TL;DR: The Handbook of Usability Testing gives you practical, step-by-step guidelines in plain English to design and administer extremely reliable tests to ensure that people find it easy and desirable to use.
Book

The cognitive walkthrough method: a practitioner's guide

TL;DR: A screw for an extruder having, in addition to the usual primary flight, at least one secondary flight in its terminal region, the primary and secondary flights are adapted to minimize cross-flow of material between axially adjacent flights.
Trending Questions (1)
How does paper why johnny can't encrypt compare in contemporary context?

The paper discusses the usability flaws of PGP 5.0 and the need for improved user interface design for effective security.