TY - GEN
T1 - Is Cryptographic Deniability Sufficient? Non-Expert Perceptions of Deniability in Secure Messaging
AU - Reitinger, Nathan
AU - Malkin, Nathan
AU - Akgul, Omer
AU - Mazurek, Michelle L.
AU - Miers, Ian
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - Cryptographers have long been concerned with secure messaging protocols threatening deniability. Many messaging protocols - including, surprisingly, modern email - contain digital signatures which definitively tie the author to their message. If stolen or leaked, these signatures make it impossible to deny authorship. As illustrated by events surrounding leaks from Hilary Clinton's 2016 U.S. presidential campaign, this concern has proven well founded. Deniable protocols are meant to avoid this very outcome, letting politicians and dissidents alike safely disavow authorship. Despite being deployed on billions of devices in Signal and WhatsApp, the effectiveness of such protocols in convincing people remains unstudied. While the absence of cryptographic evidence is clearly necessary for an effective denial, is it sufficient?We conduct a survey study (n = 1, 200) to understand how people perceive evidence of deniability related to encrypted messaging protocols. Surprisingly, in a world of "fake news"and Photoshop, we find that simple denials of message authorship, when presented in a courtroom setting without supporting evidence, are not effective. In contrast, participants who were given access to a screenshot forgery tool or even told one exists were much more likely to believe a denial. Similarly, but to a lesser degree, we find an expert cryptographer's assertion that there is no evidence is also effective.
AB - Cryptographers have long been concerned with secure messaging protocols threatening deniability. Many messaging protocols - including, surprisingly, modern email - contain digital signatures which definitively tie the author to their message. If stolen or leaked, these signatures make it impossible to deny authorship. As illustrated by events surrounding leaks from Hilary Clinton's 2016 U.S. presidential campaign, this concern has proven well founded. Deniable protocols are meant to avoid this very outcome, letting politicians and dissidents alike safely disavow authorship. Despite being deployed on billions of devices in Signal and WhatsApp, the effectiveness of such protocols in convincing people remains unstudied. While the absence of cryptographic evidence is clearly necessary for an effective denial, is it sufficient?We conduct a survey study (n = 1, 200) to understand how people perceive evidence of deniability related to encrypted messaging protocols. Surprisingly, in a world of "fake news"and Photoshop, we find that simple denials of message authorship, when presented in a courtroom setting without supporting evidence, are not effective. In contrast, participants who were given access to a screenshot forgery tool or even told one exists were much more likely to believe a denial. Similarly, but to a lesser degree, we find an expert cryptographer's assertion that there is no evidence is also effective.
UR - http://www.scopus.com/inward/record.url?scp=85166466911&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85166466911&partnerID=8YFLogxK
U2 - 10.1109/SP46215.2023.10179361
DO - 10.1109/SP46215.2023.10179361
M3 - Conference contribution
AN - SCOPUS:85166466911
T3 - Proceedings - IEEE Symposium on Security and Privacy
SP - 274
EP - 292
BT - Proceedings - 44th IEEE Symposium on Security and Privacy, SP 2023
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 44th IEEE Symposium on Security and Privacy, SP 2023
Y2 - 22 May 2023 through 25 May 2023
ER -