Skip to main navigation Skip to search Skip to main content

A study of user-friendly hash comparison schemes

  • Hsu Chun Hsiao*
  • , Yue Hsun Lin
  • , Ahren Studer
  • , Cassandra Studer
  • , King Hang Wang
  • , Hiroaki Kikuchi
  • , Adrian Perrig
  • , Hung Min Sun
  • , Bo Yin Yang
  • *Corresponding author for this work

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

34 Citations (Scopus)

Abstract

Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans may make a mistake or require significant time and patience to accurately compare the hash values. To improve usability during comparison, a number of researchers have proposed various hash representations that use words, sentences, or images rather than numbers. This is the first work to perform a comparative study of these hash comparison schemes to determine which scheme allows the fastest and most accurate comparison. To evaluate the schemes, we performed an online user study with more than 400 participants. Our findings indicate that only a small number of schemes allow quick and accurate comparison across a wide range of subjects from varying backgrounds.

Original languageEnglish
Title of host publication25th Annual Computer Conference Security Applications, ACSAC 2009
PublisherIEEE
Pages105-114
Number of pages10
ISBN (Print)9780769539195, 9781424453276
DOIs
Publication statusPublished - 7 Dec 2009
Event25th Annual Computer Conference Security Applications, ACSAC 2009 - Honolulu, HI, United States
Duration: 7 Dec 200911 Dec 2009
https://doi.org/10.1109/acsac16390.2009

Publication series

NameProceedings - Annual Computer Security Applications Conference, ACSAC
PublisherIEEE
ISSN (Print)1063-9527

Conference

Conference25th Annual Computer Conference Security Applications, ACSAC 2009
Abbreviated titleACSAC 2009
Country/TerritoryUnited States
CityHonolulu, HI
Period7/12/0911/12/09
OtherConference Proceedings
Internet address

User-Defined Keywords

  • Human factors
  • Security

Fingerprint

Dive into the research topics of 'A study of user-friendly hash comparison schemes'. Together they form a unique fingerprint.

Cite this