An Empirical Study of Textual Key-Fingerprint Representations
نویسندگان
چکیده
Many security protocols still rely on manual fingerprint comparisons for authentication. The most well-known and widely used key-fingerprint representation are hexadecimal strings as used in various security tools. With the introduction of end-to-end security in WhatsApp and other messengers, the discussion on how to best represent key-fingerprints for users is receiving a lot of interest. We conduct a 1047 participant study evaluating six different textual key-fingerprint representations with regards to their performance and usability. We focus on textual fingerprints as the most robust and deployable representation. Our findings show that the currently used hexadecimal representation is more prone to partial preimage attacks in comparison to others. Based on our findings, we make the recommendation that two alternative representations should be adopted. The highest attack detection rate and best usability perception is achieved with a sentence-based encoding. If language-based representations are not acceptable, a simple numeric approach still outperforms the hexadecimal representation.
منابع مشابه
A Contrastive Study of Theme in English and Azerbaijani Turkish Fictional Texts
Thematisationis one of the troublesome areas both for translation purposes from or into English and also for learning EFL. The main reason for the problem lies in the fact that usually different languages structure thematisation in different ways. Therefore, the present research is an attempt to investigate contrastively: experiential (topical), interpersonal and textual themes in a sample of A...
متن کاملThe Effect of Explicit Teaching of Textual Metadiscourse on ESAP Reading Comprehension Performance of Iranian University Students
The present study attempted the relative effect of explicit teaching of textual metadiscourse markers on ESAP reading comprehension performance of Iranian university students through an awareness raising experiment. A sixty-item multiple choice ESAP reading comprehension test of accounting was developed and validated to act as the pre-test and post-test. The test included items for assessing sp...
متن کاملEEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations
GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...
متن کاملOn the Individuality of Fingerprints
ÐFingerprint identification is based on two basic premises: 1) persistence: the basic characteristics of fingerprints do not change with time and 2) individuality: the fingerprint is unique to an individual. The validity of the first premise has been established by the anatomy and morphogenesis of friction ridge skin. While the second premise has been generally accepted to be true based on empi...
متن کاملTextual Fingerprinting with Texts from Parkin, Bassewitz, and Leander
Current research in author profiling to discover a legal author’s fingerprint does not only follow examinations based on statistical parameters only but include more and more dynamic methods that can learn and that react adaptable to the specific behavior of an author. But the question on how to appropriately represent a text is still one of the fundamental tasks, and the problem of which attri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016