Chapter 5

Communicating Securely

Slides

Mentioned in class

Handouts

Required Reading

Not required - a good more modern similar study of encryption:

Learning Outcomes

Topics

  • Public/Private key cryptography
  • Encrypting modern communication
  • Cognitive walkthrough
  • Usability heuristics
  • Think aloud

Understand

  • Why Johnny Can’t Encrypt is so famous.

  • Encryption is only helpful if its security assumptions are met AND the properties it provides meet users needs.

  • Research often requires several rounds of study and the early rounds can be informal.

  • What a hard problem looks like in Usable Security and Privacy and what makes it so hard to solve.

  • How USEC relates to general security research.

  • HCI methodologies: think aloud, cognitive walkthrough

  • Public private key encryption

Apply

  • Think about a security or privacy technology that you often use and claims to be encrypted. How might you run a study like the Johnny paper on that technology and how would you expect the results to be the same or different?
  • Compare Telegram and Signal in terms of communication security.

Lecture Notes

Why Johnny Can’t Encrypt is one of the most famous studies in Usable Privacy and Security. It showed that even PhD students at Carnegie Mellon University could not accurately send and receive encrypted email messages without making very serious errors.

Additional Resources