are wrong. In the current implementation, one chal-
lenge in the UAN protocol includes four clauses on
the screen, one clause includes five words, and there
are six colors in use. Thus, an attacker would need
to consider several possible color combinations at ev-
ery response. They would be able to break the color-
to-number mapping only by seeing several successful
UAN protocols, which is highly unlikely, because the
protocol is conducted rarely and it is assumed that the
surroundings are safe.
Using a personal word database might make it eas-
ier for a human user to remember the story, if they
were allowed to add some new words of their choice
to be used in the story upon registering to the service.
On the other hand, that could also be a risk: many
users would probably pick personal or otherwise devi-
ating words, which would be easy to spot when shoul-
der surfing.
Using more advanced techniques in story gener-
ation phase might be advantageous. In the current
implementation, even though the clauses are gram-
matically correct, the result is not very coherent or
meaningful. By utilizing technology such as GPT-3
(Brown et al., 2020), which is capable of producing
texts resembling human-generated ones, it would be
possible to make the story memorable and still main-
tain its randomness.
For the visual channel, we would recommend us-
ing a visual encoding scheme different from QR codes
in a real use scenario. QR codes cannot be placed
as densely as other visual encoding schemes, as they
require ”free zones” around them. With some other
visual encoding scheme, the GUI could achieve a
cleaner look as well.
Performance of the application is also important.
The user needs to be able to view a whole frame at
once, and the application needs to be able to decipher
the picture. With bigger QR codes the application rec-
ognizes the elements more easily, improving the per-
formance. When developing an application like this
for real users, usage optimization and achieving high
enough framerate are extremely important. No one
will use the application if the camera view lags visi-
bly or if the application has great difficulties scanning
the frame. Finally, if the system was implemented on
smart glasses, the GUI and application performance
would need their own consideration.
Next step for our work on EEVEHAC is usability
testing. The usability of the first phase of HAKE can
be compared to other results on the usability of human
computable functions. The second phase has few di-
rect comparisons, but its usability can be analyzed by
how much physical effort it takes to use the devices.
7 CONCLUSIONS
In this paper, we presented the EEVEHAC (End-to-
End Visualizable Encrypted and Human Authenti-
cated Channel) system. The main purpose of EEVE-
HAC is to involve the human user in the cryptographic
process in order to enhance understanding and trust in
the digital systems that are a crucial part of our every-
day lives. Our security analysis indicates that EEVE-
HAC can achieve as high a security level as its in-
dividual parts. Our proof-of-concept implementation
is not secure enough for real world usage but imple-
mentations of EEVEHAC can easily be modified to
achieve higher security.
REFERENCES
Bellovin, S. M. and Merritt, M. (1992). Encrypted key ex-
change: Password-based protocols secure against dictio-
nary attacks. In Proceedings of the 1992 IEEE Sympo-
sium on Security and Privacy, SP ’92, page 72, USA.
IEEE Computer Society.
Boldyreva, A., Chen, S., Dupont, P.-A., and Pointcheval, D.
(2017). Human computing for handling strong corrup-
tions in authenticated key exchange. In Computer Se-
curity Foundations Symposium (CSF), 2017 IEEE 30th,
pages 159–175. IEEE.
Brown, T. B., Mann, B., Ryder, N., Subbiah, M., Kaplan,
J., Dhariwal, P., Neelakantan, A., Shyam, P., Sastry, G.,
Askell, A., Agarwal, S., Herbert-Voss, A., Krueger, G.,
Henighan, T., Child, R., Ramesh, A., Ziegler, D. M., Wu,
J., Winter, C., Hesse, C., Chen, M., Sigler, E., Litwin, M.,
Gray, S., Chess, B., Clark, J., Berner, C., McCandlish,
S., Radford, A., Sutskever, I., and Amodei, D. (2020).
Language models are few-shot learners.
Daemen, J. and Rijmen, V. (2002). The design of Rijndael,
volume 2. Springer.
Dolev, D. and Yao, A. (1983). On the security of public
key protocols. IEEE Transactions on Information The-
ory, 29(2):198–208.
Forte, A. G., Garay, J. A., Jim, T., and Vahlis, Y. (2014).
EyeDecrypt—private interactions in plain sight. In Inter-
national Conference on Security and Cryptography for
Networks, pages 255–276. Springer.
Halunen, K. and Latvala, O.-M. (2021). Review of the use
of human senses and capabilities in cryptography. Com-
puter Science Review, 39:100340.
Krawczyk, H., Bellare, M., and Canetti, R. (1997). HMAC:
Keyed-hashing for message authentication.
Naor, M. and Shamir, A. (1994). Visual cryptography. In
Workshop on the Theory and Application of of Crypto-
graphic Techniques, pages 1–12. Springer.
Somayaji, A., Mould, D., and Brown, C. (2013). Towards
narrative authentication: Or, against boring authentica-
tion. In Proceedings of the 2013 New Security Paradigms
Workshop, pages 57–64.
SECRYPT 2021 - 18th International Conference on Security and Cryptography
664