Loading…
Adoption Challenges for Cryptographic Protocols
We interviewed cryptography experts from academia and industry to learn from their experiences with the design and deployment of cryptographic protocols. We present adoption challenges, including misaligned incentives in academia and standardization, mismatched assumptions, low-quality reference imp...
Saved in:
Published in: | IEEE security & privacy 2024-11, Vol.22 (6), p.19-29 |
---|---|
Main Authors: | , , , , , |
Format: | Magazinearticle |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 29 |
container_issue | 6 |
container_start_page | 19 |
container_title | IEEE security & privacy |
container_volume | 22 |
creator | Fischer, Konstantin Trummova, Ivana Gajland, Phillip Acar, Yasemin Fahl, Sascha Sasse, M. Angela |
description | We interviewed cryptography experts from academia and industry to learn from their experiences with the design and deployment of cryptographic protocols. We present adoption challenges, including misaligned incentives in academia and standardization, mismatched assumptions, low-quality reference implementations, and usability issues. |
doi_str_mv | 10.1109/MSEC.2024.3449809 |
format | magazinearticle |
fullrecord | <record><control><sourceid>crossref_ieee_</sourceid><recordid>TN_cdi_crossref_primary_10_1109_MSEC_2024_3449809</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10682600</ieee_id><sourcerecordid>10_1109_MSEC_2024_3449809</sourcerecordid><originalsourceid>FETCH-LOGICAL-c148t-6dbf8652e89fda4f44b7a929207a50310e38c274ca34b6b46385530372bce0f43</originalsourceid><addsrcrecordid>eNpNj8tOwzAURC0EEqXwAUgs8gNJr-1rx15WUXlIRSABa8tx7DYo1JGdTf8eonbBamYxZ6RDyD2FilLQq9ePTVMxYFhxRK1AX5AFFUKVCCgv545Q1lrza3KT8zcAo1SoBVmtuzhOfTwUzd4Ogz_sfC5CTEWTjuMUd8mO-94V7ylO0cUh35KrYIfs7865JF-Pm8_mudy-Pb00623pKKqplF0blBTMKx06iwGxra1mmkFtBXAKnivHanSWYytblFwJwYHXrHUeAvIloadfl2LOyQczpv7HpqOhYGZjMxub2dicjf-YhxPTe-__7aViEoD_AvmQUXM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype></control><display><type>magazinearticle</type><title>Adoption Challenges for Cryptographic Protocols</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Fischer, Konstantin ; Trummova, Ivana ; Gajland, Phillip ; Acar, Yasemin ; Fahl, Sascha ; Sasse, M. Angela</creator><creatorcontrib>Fischer, Konstantin ; Trummova, Ivana ; Gajland, Phillip ; Acar, Yasemin ; Fahl, Sascha ; Sasse, M. Angela</creatorcontrib><description>We interviewed cryptography experts from academia and industry to learn from their experiences with the design and deployment of cryptographic protocols. We present adoption challenges, including misaligned incentives in academia and standardization, mismatched assumptions, low-quality reference implementations, and usability issues.</description><identifier>ISSN: 1540-7993</identifier><identifier>EISSN: 1558-4046</identifier><identifier>DOI: 10.1109/MSEC.2024.3449809</identifier><identifier>CODEN: ISPMCN</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cryptography ; Design methodology ; Industries ; Interviews ; Performance evaluation ; Protocols ; Security ; Stakeholders ; User experience</subject><ispartof>IEEE security & privacy, 2024-11, Vol.22 (6), p.19-29</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><orcidid>0000-0001-7167-7383 ; 0000-0003-1823-5505 ; 0000-0002-5094-6158 ; 0000-0002-5644-3316 ; 0000-0002-7610-5963</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10682600$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>780,784,27925,54796</link.rule.ids></links><search><creatorcontrib>Fischer, Konstantin</creatorcontrib><creatorcontrib>Trummova, Ivana</creatorcontrib><creatorcontrib>Gajland, Phillip</creatorcontrib><creatorcontrib>Acar, Yasemin</creatorcontrib><creatorcontrib>Fahl, Sascha</creatorcontrib><creatorcontrib>Sasse, M. Angela</creatorcontrib><title>Adoption Challenges for Cryptographic Protocols</title><title>IEEE security & privacy</title><addtitle>MSEC</addtitle><description>We interviewed cryptography experts from academia and industry to learn from their experiences with the design and deployment of cryptographic protocols. We present adoption challenges, including misaligned incentives in academia and standardization, mismatched assumptions, low-quality reference implementations, and usability issues.</description><subject>Cryptography</subject><subject>Design methodology</subject><subject>Industries</subject><subject>Interviews</subject><subject>Performance evaluation</subject><subject>Protocols</subject><subject>Security</subject><subject>Stakeholders</subject><subject>User experience</subject><issn>1540-7993</issn><issn>1558-4046</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2024</creationdate><recordtype>magazinearticle</recordtype><recordid>eNpNj8tOwzAURC0EEqXwAUgs8gNJr-1rx15WUXlIRSABa8tx7DYo1JGdTf8eonbBamYxZ6RDyD2FilLQq9ePTVMxYFhxRK1AX5AFFUKVCCgv545Q1lrza3KT8zcAo1SoBVmtuzhOfTwUzd4Ogz_sfC5CTEWTjuMUd8mO-94V7ylO0cUh35KrYIfs7865JF-Pm8_mudy-Pb00623pKKqplF0blBTMKx06iwGxra1mmkFtBXAKnivHanSWYytblFwJwYHXrHUeAvIloadfl2LOyQczpv7HpqOhYGZjMxub2dicjf-YhxPTe-__7aViEoD_AvmQUXM</recordid><startdate>202411</startdate><enddate>202411</enddate><creator>Fischer, Konstantin</creator><creator>Trummova, Ivana</creator><creator>Gajland, Phillip</creator><creator>Acar, Yasemin</creator><creator>Fahl, Sascha</creator><creator>Sasse, M. Angela</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-7167-7383</orcidid><orcidid>https://orcid.org/0000-0003-1823-5505</orcidid><orcidid>https://orcid.org/0000-0002-5094-6158</orcidid><orcidid>https://orcid.org/0000-0002-5644-3316</orcidid><orcidid>https://orcid.org/0000-0002-7610-5963</orcidid></search><sort><creationdate>202411</creationdate><title>Adoption Challenges for Cryptographic Protocols</title><author>Fischer, Konstantin ; Trummova, Ivana ; Gajland, Phillip ; Acar, Yasemin ; Fahl, Sascha ; Sasse, M. Angela</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c148t-6dbf8652e89fda4f44b7a929207a50310e38c274ca34b6b46385530372bce0f43</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Cryptography</topic><topic>Design methodology</topic><topic>Industries</topic><topic>Interviews</topic><topic>Performance evaluation</topic><topic>Protocols</topic><topic>Security</topic><topic>Stakeholders</topic><topic>User experience</topic><toplevel>online_resources</toplevel><creatorcontrib>Fischer, Konstantin</creatorcontrib><creatorcontrib>Trummova, Ivana</creatorcontrib><creatorcontrib>Gajland, Phillip</creatorcontrib><creatorcontrib>Acar, Yasemin</creatorcontrib><creatorcontrib>Fahl, Sascha</creatorcontrib><creatorcontrib>Sasse, M. Angela</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEL</collection><collection>CrossRef</collection><jtitle>IEEE security & privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Fischer, Konstantin</au><au>Trummova, Ivana</au><au>Gajland, Phillip</au><au>Acar, Yasemin</au><au>Fahl, Sascha</au><au>Sasse, M. Angela</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Adoption Challenges for Cryptographic Protocols</atitle><jtitle>IEEE security & privacy</jtitle><stitle>MSEC</stitle><date>2024-11</date><risdate>2024</risdate><volume>22</volume><issue>6</issue><spage>19</spage><epage>29</epage><pages>19-29</pages><issn>1540-7993</issn><eissn>1558-4046</eissn><coden>ISPMCN</coden><abstract>We interviewed cryptography experts from academia and industry to learn from their experiences with the design and deployment of cryptographic protocols. We present adoption challenges, including misaligned incentives in academia and standardization, mismatched assumptions, low-quality reference implementations, and usability issues.</abstract><pub>IEEE</pub><doi>10.1109/MSEC.2024.3449809</doi><tpages>11</tpages><orcidid>https://orcid.org/0000-0001-7167-7383</orcidid><orcidid>https://orcid.org/0000-0003-1823-5505</orcidid><orcidid>https://orcid.org/0000-0002-5094-6158</orcidid><orcidid>https://orcid.org/0000-0002-5644-3316</orcidid><orcidid>https://orcid.org/0000-0002-7610-5963</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1540-7993 |
ispartof | IEEE security & privacy, 2024-11, Vol.22 (6), p.19-29 |
issn | 1540-7993 1558-4046 |
language | eng |
recordid | cdi_crossref_primary_10_1109_MSEC_2024_3449809 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Cryptography Design methodology Industries Interviews Performance evaluation Protocols Security Stakeholders User experience |
title | Adoption Challenges for Cryptographic Protocols |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T02%3A20%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Adoption%20Challenges%20for%20Cryptographic%20Protocols&rft.jtitle=IEEE%20security%20&%20privacy&rft.au=Fischer,%20Konstantin&rft.date=2024-11&rft.volume=22&rft.issue=6&rft.spage=19&rft.epage=29&rft.pages=19-29&rft.issn=1540-7993&rft.eissn=1558-4046&rft.coden=ISPMCN&rft_id=info:doi/10.1109/MSEC.2024.3449809&rft_dat=%3Ccrossref_ieee_%3E10_1109_MSEC_2024_3449809%3C/crossref_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c148t-6dbf8652e89fda4f44b7a929207a50310e38c274ca34b6b46385530372bce0f43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10682600&rfr_iscdi=true |