Making Encryption Feel Secure: Investigating how Descriptions of Encryption Impact Perceived Security.
Verena DistlerCarine LallemandVincent KoenigPublished in: EuroS&P Workshops (2020)
Keyphrases
- encryption scheme
- security properties
- key management
- data encryption
- encryption decryption
- key exchange
- security analysis
- integrity verification
- encryption algorithms
- public key cryptography
- high security
- security requirements
- stream cipher
- private key
- digital rights management
- secret key
- cryptographic protocols
- data security
- mutual authentication
- data confidentiality
- advanced encryption standard
- digital signature
- identity authentication
- diffie hellman
- public key
- encryption algorithm
- cca secure
- cryptographic algorithms
- security mechanisms
- standard model
- key distribution
- elliptic curve cryptography
- authentication scheme
- security level
- data protection
- secret sharing scheme
- security protocols
- public key infrastructure
- key agreement
- provably secure
- virtual private network
- image encryption
- secure communication
- pseudorandom
- security issues
- access control
- information security
- ad hoc networks
- data sharing
- authentication mechanism
- resource constrained
- sensitive data
- key exchange protocol
- elliptic curve
- digital content
- authentication protocol
- encryption key
- security model
- personal information
- group communication
- security management
- security services