Can Unicorns Help Users Compare Crypto Key Fingerprints?
CHI, pp. 3787-3798, 2017.
Many authentication schemes ask users to manually compare compact representations of cryptographic keys, known as fingerprints. If the fingerprints do not match, that may signal a man-in-the-middle attack. An adversary performing an attack may use a fingerprint that is similar to the target fingerprint, but not an exact match, to try to f...More
Full Text (Upload PDF)
PPT (Upload PPT)