The usability of end user cryptographic products

  • Authors:
  • Michael Sweikata;Gary Watson;Charles Frank;Chris Christensen;Yi Hu

  • Affiliations:
  • Northern Kentucky University, Highland Heights, KY;Northern Kentucky University, Highland Heights, KY;Northern Kentucky University, Highland Heights, KY;Northern Kentucky University, Highland Heights, KY;Northern Kentucky University, Highland Heights, KY

  • Venue:
  • 2009 Information Security Curriculum Development Conference
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Cryptography is an indispensable tool for securing data and for ensuring the privacy of communications such as web browsing and email. Although there are many practical utilities which can encrypt disks, file systems, and emails, these utilities are still not widely adopted by end users. One intention of cryptographic utilities is to enhance the confidentiality of information. From the security practitioner's point of view, cryptography is a must for protecting sensitive data. System administrators and technical savvy people not only think many existing cryptography products are useful but also usable, at least to some extent. However, when viewed by majority of end users who do not have the technical background on cryptography, key and password management, authentication, and the complexity for using cryptography products can be the hurdles for making these utilities usable. This paper studies free and low-cost cryptographic products including encrypted flash drives, hard drives, file systems, and email systems to assess their usability. We also make recommendations for usable end-user cryptography.