Can Unicorns Help Users Compare Crypto Key Fingerprints?

Joshua Tan
Joshua Tan
Jeremy Thomas
Jeremy Thomas

CHI, pp. 3787-3798, 2017.

Cited by: 37|Bibtex|Views95|DOI:https://doi.org/10.1145/3025453.3025733
EI
Other Links: dblp.uni-trier.de|dl.acm.org|academic.microsoft.com

Abstract:

Many authentication schemes ask users to manually compare compact representations of cryptographic keys, known as fingerprints. If the fingerprints do not match, that may signal a man-in-the-middle attack. An adversary performing an attack may use a fingerprint that is similar to the target fingerprint, but not an exact match, to try to f...More

Code:

Data:

Your rating :
0

 

Tags
Comments