Usability of End-to-End Encryption in E-Mail Communication

被引:5
|
作者
Reuter, Adrian [1 ]
Abdelmaksoud, Ahmed [2 ]
Boudaoud, Karima [3 ]
Winckler, Marco [3 ]
机构
[1] Tech Univ Munich, Dept Informat, Munich, Germany
[2] Univ Cote dAzur, Poytech Nice Sophia, Nice, France
[3] Univ Cote dAzur, CNRS, I3S, Nice, France
来源
FRONTIERS IN BIG DATA | 2021年 / 4卷
关键词
e-mail encryption; user study; user testing; usability; PGP; S/MIME; PEP;
D O I
10.3389/fdata.2021.568284
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the results of a usability study focused on three end-to-end encryption technologies for securing e-mail traffic, namely PGP, S/MIME, and Pretty Easy Privacy (pEp). The findings of this study show that, despite of existing technology, users seldom apply them for securing e-mail communication. Moreover, this study helps to explain why users hesitate to employ encryption technology in their e-mail communication. For this usability study, we have combined two methods: 1) an online survey, 2) and user testing with 12 participants who were enrolled in tasks requiring e-mail encryption. We found that more than 60% of our study participants (in both methods) are unaware of the existence of encryption technologies and thus never tried to use one. We observed that above all, users 1) are overwhelmed with the management of public keys and 2) struggle with the setup of encryption technology in their e-mail software. Nonetheless, 66% of the participants consider secure e-mail communication as important or very important. Particularly, we found an even stronger concern about identity theft among e-mail users, as 78% of the participants want to make sure that no other person is able to write e-mail on their behalf.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] Performance Evaluation of Fully Homomorphic Encryption for End-to-End Cryptographic Communication in Multihop Networks
    Shim, Hye-Yeon
    Park, Tae-Rim
    Lee, Il-Gu
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 431 - 434
  • [22] Implementing end-to-end encryption strategist for strengthening data security across network communication
    Balpande, Vijaya Parag
    Aher, Ujjwala Bal
    Borkar, Pradnya
    Bhanarkar, Parul
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 465 - 476
  • [23] SECURE COMMUNICATION IN INTERNET ENVIRONMENTS - A HIERARCHICAL KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION
    LU, WP
    SUNDARESHAN, MK
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1989, 37 (10) : 1014 - 1023
  • [24] Enhanced Certificate Transparency and End-to-end Encrypted Mail
    Ryan, Mark D.
    21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [25] Keep your e-mail secure with encryption
    不详
    DATAMATION, 1997, 43 (04): : 21 - 22
  • [26] Deniable authenticated encryption for e-mail applications
    Jin C.
    Chen G.
    Yu C.
    Zhao J.
    International Journal of Computers and Applications, 2020, 42 (05): : 429 - 438
  • [27] SECURE E-MAIL CHEAPLY WITH SOFTWARE ENCRYPTION
    STRAUSS, P
    DATAMATION, 1993, 39 (23): : 48 - &
  • [28] E-mail about e-mail?
    Recine, L
    DATAMATION, 1996, 42 (13): : 7 - 8
  • [29] Gender Differences in E-mail Communication
    Fan, LiPing
    ADVANCED RESEARCH ON AUTOMATION, COMMUNICATION, ARCHITECTONICS AND MATERIALS, PTS 1 AND 2, 2011, 225-226 (1-2): : 346 - 349
  • [30] E-mail minus 'E-mail'
    Solovy, A
    HOSPITALS & HEALTH NETWORKS, 2002, 76 (11): : 26 - 26