Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC

Julius Hekkala, Sara Nikula, Outi-Marja Latvala, Kimmo Halunen, Kimmo Halunen

2021

Abstract

Our digital lives rely on modern cryptography that is based on complicated mathematics average human users cannot follow. Previous attempts at adding the human user into the cryptographic loop include things like Human Authenticated Key Exchange and visualizable cryptography. This paper presents our proof-of-concept implementation of these ideas as a system called EEVEHAC. It utilizes human capabilities to achieve an end-to-end encrypted channel between a user and a server that is authenticated with human senses and can be used through untrusted environments. The security of this complete system is analyzed. We find that the combination of the two different systems into EEVEHAC on a theoretical level retains the security of the individual systems. We also identify the weaknesses of this implementation and discuss options for overcoming them.

Download


Paper Citation


in Harvard Style

Hekkala J., Nikula S., Latvala O. and Halunen K. (2021). Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC. In Proceedings of the 18th International Conference on Security and Cryptography - Volume 1: SECRYPT, ISBN 978-989-758-524-1, pages 659-664. DOI: 10.5220/0010517806590664


in Bibtex Style

@conference{secrypt21,
author={Julius Hekkala and Sara Nikula and Outi-Marja Latvala and Kimmo Halunen},
title={Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC},
booktitle={Proceedings of the 18th International Conference on Security and Cryptography - Volume 1: SECRYPT,},
year={2021},
pages={659-664},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010517806590664},
isbn={978-989-758-524-1},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 18th International Conference on Security and Cryptography - Volume 1: SECRYPT,
TI - Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of EEVEHAC
SN - 978-989-758-524-1
AU - Hekkala J.
AU - Nikula S.
AU - Latvala O.
AU - Halunen K.
PY - 2021
SP - 659
EP - 664
DO - 10.5220/0010517806590664