Visualizing your key for secure phone calls and language independence

Michael Oehler, Dhananjay Phatak, Frank John Krautheim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

We present a method to visualize and authenticate a cryptographically negotiated key for a secure phone call. That is, each caller is presented with a graphical representation of the key and through verbal interaction (i.e., side-channel authentication) they describe what they see. If they agree, the key is authenticated and the secure media session continues. The strength of the approach lies in the vocal recognition of the callers, and their ability to confirm the image displayed by their system. The necessary degree of visual recognition is achieved by using basic shapes, color and count. People, regardless of language or age, can easily identifying these images. Our experience shows that they can communicate what they see with little effort and terminate the call when they differ. We believe that this approach reverses the current trend in security to divest users from the underlying cryptographic principles supporting secure systems by abstracting these principles to a comprehensible and visual form. This paper demonstrates that visualization and the human factor can play a pivotal role in establishing a secure communication channel. This short paper discusses how a key is visualized and provides some initial user feedback. We have named this approach the Short Authentication SymbolS VisuallY (SASSY.)

Original languageEnglish (US)
Title of host publicationVizSec 2010 - Proceedings of the 7th International Symposium on Visualization for Cyber Security
Pages64-69
Number of pages6
DOIs
StatePublished - Nov 17 2010
Event7th International Symposium on Visualization for Cyber Security, VizSec 2010 - Ottawa, ON, Canada
Duration: Sep 14 2010Sep 14 2010

Publication series

NameACM International Conference Proceeding Series

Other

Other7th International Symposium on Visualization for Cyber Security, VizSec 2010
CountryCanada
CityOttawa, ON
Period9/14/109/14/10

Fingerprint

Authentication
Human engineering
Visualization
Color
Feedback
Secure communication

Keywords

  • authenticated key agreement
  • human-assisted authentication
  • side channel authentication
  • visual authentication

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Cite this

Oehler, M., Phatak, D., & Krautheim, F. J. (2010). Visualizing your key for secure phone calls and language independence. In VizSec 2010 - Proceedings of the 7th International Symposium on Visualization for Cyber Security (pp. 64-69). (ACM International Conference Proceeding Series). https://doi.org/10.1145/1850795.1850803

Visualizing your key for secure phone calls and language independence. / Oehler, Michael; Phatak, Dhananjay; Krautheim, Frank John.

VizSec 2010 - Proceedings of the 7th International Symposium on Visualization for Cyber Security. 2010. p. 64-69 (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Oehler, M, Phatak, D & Krautheim, FJ 2010, Visualizing your key for secure phone calls and language independence. in VizSec 2010 - Proceedings of the 7th International Symposium on Visualization for Cyber Security. ACM International Conference Proceeding Series, pp. 64-69, 7th International Symposium on Visualization for Cyber Security, VizSec 2010, Ottawa, ON, Canada, 9/14/10. https://doi.org/10.1145/1850795.1850803
Oehler M, Phatak D, Krautheim FJ. Visualizing your key for secure phone calls and language independence. In VizSec 2010 - Proceedings of the 7th International Symposium on Visualization for Cyber Security. 2010. p. 64-69. (ACM International Conference Proceeding Series). https://doi.org/10.1145/1850795.1850803
Oehler, Michael ; Phatak, Dhananjay ; Krautheim, Frank John. / Visualizing your key for secure phone calls and language independence. VizSec 2010 - Proceedings of the 7th International Symposium on Visualization for Cyber Security. 2010. pp. 64-69 (ACM International Conference Proceeding Series).
@inproceedings{c11a14ef087246c1b421d241d2b3a865,
title = "Visualizing your key for secure phone calls and language independence",
abstract = "We present a method to visualize and authenticate a cryptographically negotiated key for a secure phone call. That is, each caller is presented with a graphical representation of the key and through verbal interaction (i.e., side-channel authentication) they describe what they see. If they agree, the key is authenticated and the secure media session continues. The strength of the approach lies in the vocal recognition of the callers, and their ability to confirm the image displayed by their system. The necessary degree of visual recognition is achieved by using basic shapes, color and count. People, regardless of language or age, can easily identifying these images. Our experience shows that they can communicate what they see with little effort and terminate the call when they differ. We believe that this approach reverses the current trend in security to divest users from the underlying cryptographic principles supporting secure systems by abstracting these principles to a comprehensible and visual form. This paper demonstrates that visualization and the human factor can play a pivotal role in establishing a secure communication channel. This short paper discusses how a key is visualized and provides some initial user feedback. We have named this approach the Short Authentication SymbolS VisuallY (SASSY.)",
keywords = "authenticated key agreement, human-assisted authentication, side channel authentication, visual authentication",
author = "Michael Oehler and Dhananjay Phatak and Krautheim, {Frank John}",
year = "2010",
month = "11",
day = "17",
doi = "10.1145/1850795.1850803",
language = "English (US)",
isbn = "9781450300131",
series = "ACM International Conference Proceeding Series",
pages = "64--69",
booktitle = "VizSec 2010 - Proceedings of the 7th International Symposium on Visualization for Cyber Security",

}

TY - GEN

T1 - Visualizing your key for secure phone calls and language independence

AU - Oehler, Michael

AU - Phatak, Dhananjay

AU - Krautheim, Frank John

PY - 2010/11/17

Y1 - 2010/11/17

N2 - We present a method to visualize and authenticate a cryptographically negotiated key for a secure phone call. That is, each caller is presented with a graphical representation of the key and through verbal interaction (i.e., side-channel authentication) they describe what they see. If they agree, the key is authenticated and the secure media session continues. The strength of the approach lies in the vocal recognition of the callers, and their ability to confirm the image displayed by their system. The necessary degree of visual recognition is achieved by using basic shapes, color and count. People, regardless of language or age, can easily identifying these images. Our experience shows that they can communicate what they see with little effort and terminate the call when they differ. We believe that this approach reverses the current trend in security to divest users from the underlying cryptographic principles supporting secure systems by abstracting these principles to a comprehensible and visual form. This paper demonstrates that visualization and the human factor can play a pivotal role in establishing a secure communication channel. This short paper discusses how a key is visualized and provides some initial user feedback. We have named this approach the Short Authentication SymbolS VisuallY (SASSY.)

AB - We present a method to visualize and authenticate a cryptographically negotiated key for a secure phone call. That is, each caller is presented with a graphical representation of the key and through verbal interaction (i.e., side-channel authentication) they describe what they see. If they agree, the key is authenticated and the secure media session continues. The strength of the approach lies in the vocal recognition of the callers, and their ability to confirm the image displayed by their system. The necessary degree of visual recognition is achieved by using basic shapes, color and count. People, regardless of language or age, can easily identifying these images. Our experience shows that they can communicate what they see with little effort and terminate the call when they differ. We believe that this approach reverses the current trend in security to divest users from the underlying cryptographic principles supporting secure systems by abstracting these principles to a comprehensible and visual form. This paper demonstrates that visualization and the human factor can play a pivotal role in establishing a secure communication channel. This short paper discusses how a key is visualized and provides some initial user feedback. We have named this approach the Short Authentication SymbolS VisuallY (SASSY.)

KW - authenticated key agreement

KW - human-assisted authentication

KW - side channel authentication

KW - visual authentication

UR - http://www.scopus.com/inward/record.url?scp=78149434581&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78149434581&partnerID=8YFLogxK

U2 - 10.1145/1850795.1850803

DO - 10.1145/1850795.1850803

M3 - Conference contribution

AN - SCOPUS:78149434581

SN - 9781450300131

T3 - ACM International Conference Proceeding Series

SP - 64

EP - 69

BT - VizSec 2010 - Proceedings of the 7th International Symposium on Visualization for Cyber Security

ER -