CAREER: Identifying, quantifying, and explaining design principles and user practices that enable effective long-term key management
Project Summary
Research has repeatedly and consistently shown that users struggle with key management. This state of affairs negatively impacts the security and usability of existing technologies and stymies the adoption of potentially revolutionary cryptographic systems that rely on effective long-term key management. However, there is a critical knowledge gap regarding what generalizable design principles and user practices would enable usable key management. My overall objective is to quantify and explain design principles and user practices that support long-term key management. My central hypothesis is that there is a generalizable set of key management design principles that synergize with user practices to enable long-term key management. The rationale underlying this research is that quantifying and explaining the effectiveness of design principles and user practices in existing systems will increase the understanding of underlying issues, identify generalizable principles and practices, and promote the design of effective long-term key management schemes. In addition to having supportive preliminary data, I am well-prepared to undertake this research due to my substantial experience studying key management for secure email.
I will achieve my overall objective by pursuing four specific aims that quantify and explain design principles and user practices that support key management in existing successful deployments (Aim 1), long-term usage (Aim 2), and multi-key management (Aim 3). I will also prototype and evaluate design principles for improving synchronization and recovery of cryptographic keys (Aim 4). This work will help identify generalizable principles and practices that will be transformational, improving the usability and security of existing systems and enabling the adoption of revolutionary new cryptographic systems and protocols. This research is creative and original in that it breaks from the status quo of studying key management within a single application domain and use case, instead studying it across many application domains and use cases to identify generalizable principles and practices.
My educational objective is to expose students to usable security, increasing the number of students that choose to continue studying computer science. My central hypothesis is that many students—particularly traditionally marginalized students—are more likely to pursue further computer science and computer security education if they experience how it involves more than just software engineering. I will achieve my education objective by pursuing the following two specific aims: (Aim 5) exposing undergraduate students to usable security experiences and (Aim 6) working with Loan Oaks Farm to develop experiential curricula on computer security for K–12 students.
Fully solving the challenges of usable key management will take decades, and this proposal will establish my career as a leader in this research effort. In future research, I will leverage the instruments and methods developed in this research to study additional application domains and use cases. I will also build and evaluate prototypes that address limitations and issues raised in this research, iteratively improving our understanding of the most effective key management principles and practices. Most critically, I will work with cryptographers to build usable key management into their systems from the beginning and then helping them prototype and evaluate those systems, ensuring they work under real-world constraints. %Finally, the curricula, programs, and student engagement established in my educational plan will provide a continuous stream of talented graduate students to continue this research.
Intellectual Merit: This research will help fill the critical knowledge gap regarding which generalizable design principles and user practices will enable usable key management. It will also identify design principles to avoid and user practices to disincentivize. This contribution is significant because it will promote the principled design of systems and key management schemes, improving security and usability.
Broader Impacts: Improving the usability and effectiveness of key management will improve the security of the millions of users already relying on it and enable the adoption of revolutionary cryptographic systems and protocols that could benefit millions more. The education plan will provide K–12 and undergraduate students with usable security experiences, demonstrating that computer science is more than just software engineering and encouraging them to continue studying these topics. This research will also contribute to one Ph.D. dissertation and five MS theses, increasing the nation’s supply of highly trained security experts.