Lightweight usable cryptography: a usability evaluation of the Ascon 1.2 family

06/30/2023
by   Arne Padmos, et al.
0

We present a usability study of the Ascon 1.2 family of cryptographic algorithms. As far as we know, this is the first published experimental evaluation aimed at a cryptographic design (i.e. not a specific API) with the purpose of informing which aspects to standardise. While the results show the general difficulty of choosing and applying cryptographic algorithms, there are some more specific insights. These include the possibility of confusing multiple variants, the relevance of small interfaces, and the desire for higher-level wrapper functions (e.g. for protocols). Overall, many questions are still open, including how usability could be integrated into the design and evaluation of cryptographic algorithms. Our main takeaway is that lightweight usable cryptography is an open research area that deserves greater focus. For the review of NISTIR 7977, the standardisation process of Ascon as a FIPS, and when exploring potential future SPs, the key criterion of usability should be based on realistic user testing and on triangulation from other methods.

READ FULL TEXT
research
06/13/2018

How Usable are Rust Cryptography APIs?

Context: Poor usability of cryptographic APIs is a severe source of vuln...
research
10/02/2020

Current Lightweight Cryptography Protocols in Smart City IoT Networks: A Survey

With the advent of advanced technology, IoT introduces a vast number of ...
research
02/22/2023

CryptoScratch: Developing and evaluating a block-based programming tool for teaching K-12 cryptography education using Scratch

This paper presents the design, implementation, and evaluation of a new ...
research
08/19/2022

Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API

IoT devices differ widely in crypto-supporting hardware, ranging from no...
research
05/11/2022

A Longitudinal Study of Cryptographic API – a Decade of Android Malware

Cryptography has been extensively used in Android applications to guaran...
research
11/16/2018

Deciding Indistinguishability

Computational indistinguishability is a key property in cryptography and...
research
07/26/2023

GovernR: Provenance and Confidentiality Guarantees In Research Data Repositories

We propose cryptographic protocols to incorporate time provenance guaran...

Please sign up or login with your details

Forgot password? Click here to reset