Loading…

Adoption Challenges for Cryptographic Protocols

We interviewed cryptography experts from academia and industry to learn from their experiences with the design and deployment of cryptographic protocols. We present adoption challenges, including misaligned incentives in academia and standardization, mismatched assumptions, low-quality reference imp...

Full description

Saved in:
Bibliographic Details
Published in:IEEE security & privacy 2024-11, Vol.22 (6), p.19-29
Main Authors: Fischer, Konstantin, Trummova, Ivana, Gajland, Phillip, Acar, Yasemin, Fahl, Sascha, Sasse, M. Angela
Format: Magazinearticle
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 29
container_issue 6
container_start_page 19
container_title IEEE security & privacy
container_volume 22
creator Fischer, Konstantin
Trummova, Ivana
Gajland, Phillip
Acar, Yasemin
Fahl, Sascha
Sasse, M. Angela
description We interviewed cryptography experts from academia and industry to learn from their experiences with the design and deployment of cryptographic protocols. We present adoption challenges, including misaligned incentives in academia and standardization, mismatched assumptions, low-quality reference implementations, and usability issues.
doi_str_mv 10.1109/MSEC.2024.3449809
format magazinearticle
fullrecord <record><control><sourceid>crossref_ieee_</sourceid><recordid>TN_cdi_crossref_primary_10_1109_MSEC_2024_3449809</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10682600</ieee_id><sourcerecordid>10_1109_MSEC_2024_3449809</sourcerecordid><originalsourceid>FETCH-LOGICAL-c148t-6dbf8652e89fda4f44b7a929207a50310e38c274ca34b6b46385530372bce0f43</originalsourceid><addsrcrecordid>eNpNj8tOwzAURC0EEqXwAUgs8gNJr-1rx15WUXlIRSABa8tx7DYo1JGdTf8eonbBamYxZ6RDyD2FilLQq9ePTVMxYFhxRK1AX5AFFUKVCCgv545Q1lrza3KT8zcAo1SoBVmtuzhOfTwUzd4Ogz_sfC5CTEWTjuMUd8mO-94V7ylO0cUh35KrYIfs7865JF-Pm8_mudy-Pb00623pKKqplF0blBTMKx06iwGxra1mmkFtBXAKnivHanSWYytblFwJwYHXrHUeAvIloadfl2LOyQczpv7HpqOhYGZjMxub2dicjf-YhxPTe-__7aViEoD_AvmQUXM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype></control><display><type>magazinearticle</type><title>Adoption Challenges for Cryptographic Protocols</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Fischer, Konstantin ; Trummova, Ivana ; Gajland, Phillip ; Acar, Yasemin ; Fahl, Sascha ; Sasse, M. Angela</creator><creatorcontrib>Fischer, Konstantin ; Trummova, Ivana ; Gajland, Phillip ; Acar, Yasemin ; Fahl, Sascha ; Sasse, M. Angela</creatorcontrib><description>We interviewed cryptography experts from academia and industry to learn from their experiences with the design and deployment of cryptographic protocols. We present adoption challenges, including misaligned incentives in academia and standardization, mismatched assumptions, low-quality reference implementations, and usability issues.</description><identifier>ISSN: 1540-7993</identifier><identifier>EISSN: 1558-4046</identifier><identifier>DOI: 10.1109/MSEC.2024.3449809</identifier><identifier>CODEN: ISPMCN</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cryptography ; Design methodology ; Industries ; Interviews ; Performance evaluation ; Protocols ; Security ; Stakeholders ; User experience</subject><ispartof>IEEE security &amp; privacy, 2024-11, Vol.22 (6), p.19-29</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0000-0001-7167-7383 ; 0000-0003-1823-5505 ; 0000-0002-5094-6158 ; 0000-0002-5644-3316 ; 0000-0002-7610-5963</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10682600$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,27925,54796</link.rule.ids></links><search><creatorcontrib>Fischer, Konstantin</creatorcontrib><creatorcontrib>Trummova, Ivana</creatorcontrib><creatorcontrib>Gajland, Phillip</creatorcontrib><creatorcontrib>Acar, Yasemin</creatorcontrib><creatorcontrib>Fahl, Sascha</creatorcontrib><creatorcontrib>Sasse, M. Angela</creatorcontrib><title>Adoption Challenges for Cryptographic Protocols</title><title>IEEE security &amp; privacy</title><addtitle>MSEC</addtitle><description>We interviewed cryptography experts from academia and industry to learn from their experiences with the design and deployment of cryptographic protocols. We present adoption challenges, including misaligned incentives in academia and standardization, mismatched assumptions, low-quality reference implementations, and usability issues.</description><subject>Cryptography</subject><subject>Design methodology</subject><subject>Industries</subject><subject>Interviews</subject><subject>Performance evaluation</subject><subject>Protocols</subject><subject>Security</subject><subject>Stakeholders</subject><subject>User experience</subject><issn>1540-7993</issn><issn>1558-4046</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2024</creationdate><recordtype>magazinearticle</recordtype><recordid>eNpNj8tOwzAURC0EEqXwAUgs8gNJr-1rx15WUXlIRSABa8tx7DYo1JGdTf8eonbBamYxZ6RDyD2FilLQq9ePTVMxYFhxRK1AX5AFFUKVCCgv545Q1lrza3KT8zcAo1SoBVmtuzhOfTwUzd4Ogz_sfC5CTEWTjuMUd8mO-94V7ylO0cUh35KrYIfs7865JF-Pm8_mudy-Pb00623pKKqplF0blBTMKx06iwGxra1mmkFtBXAKnivHanSWYytblFwJwYHXrHUeAvIloadfl2LOyQczpv7HpqOhYGZjMxub2dicjf-YhxPTe-__7aViEoD_AvmQUXM</recordid><startdate>202411</startdate><enddate>202411</enddate><creator>Fischer, Konstantin</creator><creator>Trummova, Ivana</creator><creator>Gajland, Phillip</creator><creator>Acar, Yasemin</creator><creator>Fahl, Sascha</creator><creator>Sasse, M. Angela</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-7167-7383</orcidid><orcidid>https://orcid.org/0000-0003-1823-5505</orcidid><orcidid>https://orcid.org/0000-0002-5094-6158</orcidid><orcidid>https://orcid.org/0000-0002-5644-3316</orcidid><orcidid>https://orcid.org/0000-0002-7610-5963</orcidid></search><sort><creationdate>202411</creationdate><title>Adoption Challenges for Cryptographic Protocols</title><author>Fischer, Konstantin ; Trummova, Ivana ; Gajland, Phillip ; Acar, Yasemin ; Fahl, Sascha ; Sasse, M. Angela</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c148t-6dbf8652e89fda4f44b7a929207a50310e38c274ca34b6b46385530372bce0f43</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Cryptography</topic><topic>Design methodology</topic><topic>Industries</topic><topic>Interviews</topic><topic>Performance evaluation</topic><topic>Protocols</topic><topic>Security</topic><topic>Stakeholders</topic><topic>User experience</topic><toplevel>online_resources</toplevel><creatorcontrib>Fischer, Konstantin</creatorcontrib><creatorcontrib>Trummova, Ivana</creatorcontrib><creatorcontrib>Gajland, Phillip</creatorcontrib><creatorcontrib>Acar, Yasemin</creatorcontrib><creatorcontrib>Fahl, Sascha</creatorcontrib><creatorcontrib>Sasse, M. Angela</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEL</collection><collection>CrossRef</collection><jtitle>IEEE security &amp; privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Fischer, Konstantin</au><au>Trummova, Ivana</au><au>Gajland, Phillip</au><au>Acar, Yasemin</au><au>Fahl, Sascha</au><au>Sasse, M. Angela</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Adoption Challenges for Cryptographic Protocols</atitle><jtitle>IEEE security &amp; privacy</jtitle><stitle>MSEC</stitle><date>2024-11</date><risdate>2024</risdate><volume>22</volume><issue>6</issue><spage>19</spage><epage>29</epage><pages>19-29</pages><issn>1540-7993</issn><eissn>1558-4046</eissn><coden>ISPMCN</coden><abstract>We interviewed cryptography experts from academia and industry to learn from their experiences with the design and deployment of cryptographic protocols. We present adoption challenges, including misaligned incentives in academia and standardization, mismatched assumptions, low-quality reference implementations, and usability issues.</abstract><pub>IEEE</pub><doi>10.1109/MSEC.2024.3449809</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0001-7167-7383</orcidid><orcidid>https://orcid.org/0000-0003-1823-5505</orcidid><orcidid>https://orcid.org/0000-0002-5094-6158</orcidid><orcidid>https://orcid.org/0000-0002-5644-3316</orcidid><orcidid>https://orcid.org/0000-0002-7610-5963</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1540-7993
ispartof IEEE security & privacy, 2024-11, Vol.22 (6), p.19-29
issn 1540-7993
1558-4046
language eng
recordid cdi_crossref_primary_10_1109_MSEC_2024_3449809
source IEEE Electronic Library (IEL) Journals
subjects Cryptography
Design methodology
Industries
Interviews
Performance evaluation
Protocols
Security
Stakeholders
User experience
title Adoption Challenges for Cryptographic Protocols
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T02%3A20%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Adoption%20Challenges%20for%20Cryptographic%20Protocols&rft.jtitle=IEEE%20security%20&%20privacy&rft.au=Fischer,%20Konstantin&rft.date=2024-11&rft.volume=22&rft.issue=6&rft.spage=19&rft.epage=29&rft.pages=19-29&rft.issn=1540-7993&rft.eissn=1558-4046&rft.coden=ISPMCN&rft_id=info:doi/10.1109/MSEC.2024.3449809&rft_dat=%3Ccrossref_ieee_%3E10_1109_MSEC_2024_3449809%3C/crossref_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c148t-6dbf8652e89fda4f44b7a929207a50310e38c274ca34b6b46385530372bce0f43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10682600&rfr_iscdi=true