Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
نویسندگان
چکیده
User errors cause or contribute to most computer security failures, yet user interfaces for security still tend to be clumsy, confusing, or near-nonexistent. Is this simply due to a failure to apply standard user interface design techniques to security? We argue that, on the contrary, effective security requires a different usability standard, and that it will not be achieved through the user interface design techniques appropriate to other types of consumer software. To test this hypothesis, we performed a case study of a security program which does have a good user interface by general standards: PGP 5.0. Our case study used a cognitive walkthrough analysis together with a laboratory user test to evaluate whether PGP 5.0 can be successfully used by cryptography novices to achieve effective electronic mail security. The analysis found a number of user interface design flaws that may contribute to security failures, and the user test demonstrated that when our test participants were given 90 minutes in which to sign and encrypt a message using PGP 5.0, the majority of them were unable to do so successfully. We conclude that PGP 5.0 is not usable enough to provide effective security for most computer users, despite its attractive graphical user interface, supporting our hypothesis that user interface design for effective security remains an open problem. We close with a brief description of our continuing work on the development and application of user interface design principles and techniques for security.
منابع مشابه
Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client
This paper presents the results of a laboratory study involving Mailvelope, a modern PGP client that integrates tightly with existing webmail providers. In our study, we brought in pairs of participants and had them attempt to use Mailvelope to communicate with each other. Our results shown that more than a decade and a half after Why Johnny Can’t Encrypt, modern PGP tools are still unusable fo...
متن کاملThe Johnny 2 Standardized Secure Messaging Scenario
We present a scenario for user testing secure messaging tools and anti-phishing technology. The scenario, Johnny 2, is loosely based on the scenario that Whitten and Tygar presented in their acclaimed paper “Why Johnny Can’t Encrypt,”[14], but provided with significantly refined detail and automation. We recently used this scenario successfully in a user test with 43-subjects. We hope that by d...
متن کاملWhy Doesn't Jane Protect Her Privacy?
End-to-end encryption has been heralded by privacy and security researchers as an effective defence against dragnet surveillance, but there is no evidence of widespread end-user uptake. We argue that the non-adoption of end-toend encryption might not be entirely due to usability issues identified by Whitten and Tygar in their seminal paper “Why Johnny Can’t Encrypt”. Our investigation revealed ...
متن کاملWhy Johnny can't or Won't Spreadsheet
This paper reports the results from a study on spreadsheet program use conducted in several departments within a city administration. Fourteen volunteer participants began the study by taking a two-day course on the spreadsheet program in question. The purpose of t.he project was to study spreadsheet program use longitudinally in a natural setting. That only three of the fourteen participants b...
متن کاملWhy (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System
APCO Project 25 (“P25”) is a suite of wireless communications protocols used in the US and elsewhere for public safety two-way (voice) radio systems. The protocols include security options in which voice and data traffic can be cryptographically protected from eavesdropping. This paper analyzes the security of P25 systems against both passive and active adversaries. We found a number of protoco...
متن کامل