Abstract
E-Mail-Verschlüsselung könnte längst flächendeckend Verwendung finden. Der Beitrag gibt eine Antwort auf die Frage, warum dies nicht der Fall ist–und macht Vorschläge, was getan werden sollte, um dies zu ändern.
Literatur
S/MIME und OpenPGP: RFC 3851–Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification, RFC 5751–Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification, RFC 3156–MIME Security with OpenPGP.
Garfinkel, Simson L.; Margrave, David; Schiller, Jeffrey I.; Nordlander, Erik; Miller, Robert C. (2005): How to make secure E-Mail easier to use. In: Gerrit van der Veer und Carolyn Gale (Hg.): CHI. Portland, 2005. S. 701–710.
Gross, Joshua B.; Rosson, Mary Beth: Looking for Trouble: Understanding End-user Security Management. In: Proceedings of the 2007 Symposium on Computer Human Interaction for the Management of Information Technology. CHIMIT’ 07, ACM, New York, 2007. Online verfügbar unter http://doi.acm.org/10.1145/1234772.1234786
Straub, Tobias: Usability Challenges of PKI. Dissertation. TU Darmstadt, 2006.
Whitten, Alma; Tygar, J. Doug: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium, 1999.
Sheng, Steve; Broderick, Levi; Koranda, Colleen Alison; Hyland, Jeremy J.: Why Johnny still can’t encrypt: evaluating the usability of E-Mail encryption software. In: Symposium On Usable Privacy and Security, 2006.
Fry, Ann; Chiasson, Sonia; Somayaji, Anil: Not sealed but delivered: The (un) usability of s/mime today. In: Annual Symposium on Information Assurance and Secure Knowledge Management (ASIA’12), Albany, NY2012 2006..
Esslinger, Bernhard: Sichere E-Mail mit S/MIME. In: Datenschutz und Datensicherheit–DuD 38 (5/2014), S. 305-313. DOI: 10.1007/s11623-014-0116-7
DeWitt, Alexander John Anthony George: Usability Issues with Security of Electronic Mail. Dissertation. Brunel University, 2007.
Roth, Volker; Straub, Tobias; Richter, Kai: Security and usability engineering with particular attention to electronic mail. In: International Journal of Human-Computer Studies 63 (1-2), 2005, S. 51–73. DOI: 10.1016/j.ijhcs.2005.04.015
Kapadia, Apu: A Case (Study) For Usability in Secure E-Mail Communication. In: IEEE Security & Privacy Mag. 5 (2), 2007, S. 80–84. DOI: 10.1109/MSP.2007.25
Farrell, Stephen: Why Don’t We Encrypt Our E-Mail? In: IEEE Internet Computing 13 (1), 2009, S. 82–85. DOI: 10.1109/MIC.2009.25
Whitten, Alma: Making security usable. Carnegie Mellon University, 2004.
West, Ryan: The Psychology of Security. In: Commun. ACM 51 (4), 2008, S. 34–40. DOI: 10.1145/1330311.1330320
Wash, Rick; Rader, Emilee (2011): Influencing Mental Models of Security: A Research Agenda. In: Proceedings of the 2011 Workshop on New Security Paradigms Workshop 2011. ACM, New York, S. 57–66. Online verfügbar unter http://doi.acm.org/10.1145/2073276.2073283
Balfanz, Dirk; Durfee, Glenn; Grinter, Rebecca E.; Smetters, D. K.: In Search of Usable Security: Five Lessons from the Field. In: IEEE Security and Privacy 2 (5), 2004, S. 19–24. DOI: 10.1109/MSP.2004.71
Johnston, J.; Eloff, J. H. P.; Labuschagne, L.: Features: Security and Human Computer Interfaces. In: Computers and Security 22 (8), 2003, S. 675–684. DOI: 10.1016/S0167-4048(03)00006-3
Nurse, Jason R. C.; Creese, Sadie; Goldsmith, Michael; Lamberts, Koen: Guidelines for usable cybersecurity: Past and present. In: 2011 International Workshop on Cyberspace Safety and Security (CSS). Milan, S. 21-26.
Author information
Authors and Affiliations
Corresponding author
Additional information
Prof. Bernhard Esslinger Professor für IT Security und Kryptologie. Ehemaliger CISO der SAP AG, heute selbstständig. Leiter des Open-Source-Projektes CrypTool (www.cryptool.org).
Prof. Dr.-Ing. Ludger Schmidt Leiter des Fachgebiets Mensch-Maschine-Systemtechnik Universität Kassel
Benjamin Strenge, M.Sc. Wissenschaftlicher Mitarbeiter Fachgebiet Mensch-Maschine-Systemtechnik Universität Kassel
Prof. Dr. Arno Wacker Leiter des Fachgebiets Angewandte Informationssicherheit Universität Kassel
Rights and permissions
About this article
Cite this article
Esslinger, B., Schmidt, L., Strenge, B. et al. Unpopuläre E-Mail-Verschlüsselung – Auflösung des Henne-Ei-Problems. Datenschutz Datensich 40, 283–289 (2016). https://doi.org/10.1007/s11623-016-0597-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11623-016-0597-7