Review Papers | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016
Review on Honey Encryption Technique
Nahri Syeda Noorunnisa, Dr. Khan Rahat Afreen
Users mostly select common passwords which are easy to remember and easy to guess. Passwords are often protected in the database in the form of cryptographic hash function. There are many hash cracking tools available which can easily crack these hashes when the passwords are weak. Weak passwords are not just the problem for hashing but also affect the security in Password-Based Encryption (PBE) scheme where the message is encrypted under a password. PBE is used to protect sensitive data and mostly used in Password Managers. Password Manager (PM) compiles small database of passwords and their associated accounts, and this database is encrypted with a user-selected master Password and is therefore vulnerable to brute force cracking of Master Password. In this review paper we have studied Honey Encryption (HE) which is a new encryption scheme that provides resilience against brute force attacks by ensuring that messages decrypted with invalid keys yield a valid-looking bogus message.
Keywords: Password-based Encryption, Password Managers, Brute force attack, Honey Encryption
Edition: Volume 5 Issue 2, February 2016
Pages: 1683 - 1686
How to Cite this Article?
Nahri Syeda Noorunnisa, Dr. Khan Rahat Afreen, "Review on Honey Encryption Technique", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV161555, Volume 5 Issue 2, February 2016, 1683 - 1686
120 PDF Views | 100 PDF Downloads
Similar Articles with Keyword 'Brute force attack'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 893 - 898Design New Security Protocol against Online Password Guessing Attacks
Nitin. R. Shinde, S. K. Sonkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2302 - 2305Authentication Using Text and Graphical Password
Mayur H Patel, Nimit S Modi
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 1683 - 1686Review on Honey Encryption Technique
Nahri Syeda Noorunnisa, Dr. Khan Rahat Afreen
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013
Pages: 229 - 232Data Encryption and Decryption Process using PSR Methodology and Performance Analysis with RSA
P. Srinivasarao, B. Chaitanya, K. Venkatesh
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 83 - 85Avoiding Brute Force attack in MANET using Honey Encryption
Vinayak P P, Nahala M A
Similar Articles with Keyword 'Honey Encryption'
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 1683 - 1686Review on Honey Encryption Technique
Nahri Syeda Noorunnisa, Dr. Khan Rahat Afreen
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 83 - 85Avoiding Brute Force attack in MANET using Honey Encryption
Vinayak P P, Nahala M A