Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Brigham Young University

2016

Secure email

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Usable, Secure Content-Based Encryption On The Web, Scott Ruoti Jul 2016

Usable, Secure Content-Based Encryption On The Web, Scott Ruoti

Theses and Dissertations

Users share private information on the web through a variety of applications, such as email, instant messaging, social media, and document sharing. Unfortunately, recent revelations have shown that not only is users' data at risk from hackers and malicious insiders, but also from government surveillance. This state of affairs motivates the need for users to be able to encrypt their online data.In this dissertation, we explore how to help users encrypt their online data, with a special focus on securing email. First, we explore the design principles that are necessary to create usable, secure email. As part of this exploration, …


The Quest To Secure Email: A Usability Analysis Of Key Management Alternatives, Jeffrey Thomas Andersen Jul 2016

The Quest To Secure Email: A Usability Analysis Of Key Management Alternatives, Jeffrey Thomas Andersen

Theses and Dissertations

The current state of email security is lacking, and the need for end-to-end encryption of email is clear. Recent research has begun to make progress towards usable, secure email for the masses (i.e., novice users without IT support). In this paper, we evaluate the usability implications of three different key management approaches: PGP, IBE, and passwords. Our work is the first formal A/B evaluation of the usability of different key management schemes, and the largest formal evaluation of secure email ever performed. Our results reveal interesting inherent usability trade-offs for each approach to secure email. Furthermore, our research results in …