Downloads: 109
M.Tech / M.E / PhD Thesis | Information Technology | India | Volume 4 Issue 2, February 2015
Web Application:(with) HoneyWords and HoneyEncryption
Harish Reddy B | Beatrice Ssowmiya J [3]
Abstract: It has become much easier for an attacker to steal hash passwords and enter into the account through legitimate user by cracking the hash passwords. So, for each user account, the legitimate password is stored with several honeywords in order to sense impersonation. If honeywords are selected properly, an adversary who steals a file of hashed passwords cannot be sure if it is the real password or a honeyword for any account. Moreover, entering with a honeyword to login will trigger an alarm notifying the administrator about a password file breach. Here I am implementing Honey Encryption for the protection of data stored by the user in a web application, that produces a cipher text, which, when decrypted with an incorrect key as guessed by the attacker, presents a plausible-looking yet incorrect plaintext password or encryption key.
Keywords: Honeywords, Honey Encryption, Authentication, Security, Password
Edition: Volume 4 Issue 2, February 2015,
Pages: 2313 - 2316
Similar Articles with Keyword 'Authentication'
Downloads: 0
Analysis Study Research Paper, Information Technology, United States of America, Volume 13 Issue 2, February 2024
Pages: 494 - 500Evolving Trends in Open-Source RDBMS: Performance, Scalability and Security Insights
Naresh Kumar Miryala
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021
Pages: 174 - 178Android Notes using Finger Print Authentication
Vaibhav Garg | Siddharth Yadav | Rishabh Kamal