The Effect of Length on Key Fingerprint Verification Security and Usability

06/07/2023
by   Dan Turner, et al.
0

In applications such as end-to-end encrypted instant messaging, secure email, and device pairing, users need to compare key fingerprints to detect impersonation and adversary-in-the-middle attacks. Key fingerprints are usually computed as truncated hashes of each party's view of the channel keys, encoded as an alphanumeric or numeric string, and compared out-of-band, e.g. manually, to detect any inconsistencies. Previous work has extensively studied the usability of various verification strategies and encoding formats, however, the exact effect of key fingerprint length on the security and usability of key fingerprint verification has not been rigorously investigated. We present a 162-participant study on the effect of numeric key fingerprint length on comparison time and error rate. While the results confirm some widely-held intuitions such as general comparison times and errors increasing significantly with length, a closer look reveals interesting nuances. The significant rise in comparison time only occurs when highly similar fingerprints are compared, and comparison time remains relatively constant otherwise. On errors, our results clearly distinguish between security non-critical errors that remain low irrespective of length and security critical errors that significantly rise, especially at higher fingerprint lengths. A noteworthy implication of this latter result is that Signal/WhatsApp key fingerprints provide a considerably lower level of security than usually assumed.

READ FULL TEXT
research
06/02/2021

Performance and Usability of Visual and Verbal Verification of Word-based Key Fingerprints

The security of messaging applications against person-in-the-middle atta...
research
08/18/2022

Oh SSH-it, what's my fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification Records in the DNS

The SSH protocol is commonly used to access remote systems on the Intern...
research
03/16/2015

Skilled Impostor Attacks Against Fingerprint Verification Systems And Its Remedy

Fingerprint verification systems are becoming ubiquitous in everyday lif...
research
10/18/2022

Automatic Detection of Fake Key Attacks in Secure Messaging

Popular instant messaging applications such as WhatsApp and Signal provi...
research
10/13/2020

FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms

Browser fingerprinting consists into collecting attributes from a web br...
research
01/20/2010

Features Based Text Similarity Detection

As the Internet help us cross cultural border by providing different inf...
research
04/19/2021

BrFAST: a Tool to Select Browser Fingerprinting Attributes for Web Authentication According to a Usability-Security Trade-off

In this demonstration, we put ourselves in the place of a website manage...

Please sign up or login with your details

Forgot password? Click here to reset