Abstract
Honey encryption is a technique to protect private data once it is put on the network. The techniques used earlier include password-based encryption techniques which seldom survive brute-force attack. A brute-force attack proceeds by trying the keys starting from one to all on the encrypted text to finally decipher the plain text as well as the key, which may be used to crack the future messages. Honey encryption can help diminish the possibility of brute-force attack. In this research work, we exploit the conception of honey encryption mechanisms, and we apply it to three category of clandestine data embracing simple sentences containing the 5 Ws (that include which, what, why, when, and where), dates, mobile numbers, and debit or credit card passwords.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Huang Z, Ayday E, Fellay J, Hubaux J-P, Juels A (2015) GenoGuard: protecting genomic data against brute-force attacks. In: Proceedings of the 36th IEEE symposium on security and privacy (SP’15), Washington, DC, USA, pp 447–462
Agrawal T, Agrawal AK, Singh SK (2019) Cloud sanctuary through effectual access control and cryptographic model. J Adv Res Dyn Control Syst 11(6):533–537
Agarwal AK, Jain A (2019) Synthesis of 2D and 3D NoC mesh router architecture in HDL environment. J Adv Res Dyn Control Syst 11(4 Special Issue):2573–2581
Tyagi N, Wang J, Wen K, Zuo D (2015) Honey encryption applications. In: Computer and network security, pp 1–16
Agarwal A (2013) Implementation of cylomatrix complexity matrix. J Nat Inspir Comput 1
Shukla S, Agarwal AK, Lakhmani A (2016) MICROCHIPS: a leading innovation in medicine. In: 2016 3rd international conference on computing for sustainable global development (INDIACom), New Delhi, pp 205–210. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7724256&isnumber=7724213
Jain P, Sardana A (2012) Defending against internet worms using honeyfarm. In: Proceedings of the international information technology conference (CUBE ‘12), Pune, India, pp 795–800
Dyer KP, Coull SE, Ristenpart T, Shrimpton T (2013) Protocol misidentification made easy with format-transforming encryption. In: Proceedings of the ACM SIGSAC conference on computer and communications security, ACM, pp 61–72
Juels A, Rivest RL (2013) Honeywords: making password-cracking detectable. In: Proceedings of the ACM SIGSAC conference on computer and communications security (CCS ‘13). ACM, pp 145–160
Yin W, Indulska J, Zhou H (2017) Protecting private data by honey encryption. North China Institute of Computing Technology, Beijing, China 2 School of ITEE, The University of Queensland, Brisbane, QLD, Australia
Gupta N, Kumar Agarwal DA (2018) Object identification using super sonic sensor: Arduino object radar. In: 2018 International conference on system modeling and advancement in research trends (SMART), Moradabad, India, pp 92–96. https://doi.org/10.1109/SYSMART.2018.8746951. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8746951&isnumber=8746843
Mihir B, Ristenart T, Rogaway P, Stegers T (2009) Format-preserving encryption. In: Selected area in cryptography, pp 295–312
Saleem A, Agarwal AK (2016) Analysis and design of secure web services. In: Proceedings of fifth international conference on soft computing for problem solving. Springer, Singapore
Joshi M, Agarwal AK, Gupta B (2019) Fractal image compression and its techniques: a review. In: Ray K, Sharma T, Rawat S, Saini R, Bandyopadhyay A (eds) Soft computing: theories and applications. Advances in intelligent systems and computing, vol 742. Springer, Singapore
Kim IS, Kim MH (2012) Agent-based honeynet framework for protecting servers in campus networks. IET Inf Secur 6(3):202–211
Agarwal T, Agarwal AK, Singh SK (2014) Cloud computing security: issues and challenges. In: Proceedings of SMART-2014, pp 10–14
Vinayak PP, Nahala MA (2015) Avoiding brute force attack in manet using honey encryption. Int J Sci Res 4(3):83–85
Yoon JW, Kim H, Jo H-J, Lee H, Lee K (2015) Visual honey encryption: application to steganography. In: Proceedings of the 3rd ACM information hiding and multimedia security workshop. ACM, Portland, Ore, USA, pp 65–74
Jaeger J, Ristenpart T, Tang Q (2016) Honey encryption beyond message recovery security. In: Advances in cryptology–EUROCRYPT 2016, pp 758–788
Agrawal N, Jain A, Agarwal A (2019) Simulation of network on chip for 3D router architecture. Int J Recent Technol Eng 8(1C2):58–62
Juels A, Ristenpart T (2014) Honey encryption: security beyond the brute-force bound. Adv Cryptol-EUROCRYPT 2014:293–310
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Agarwal, A.K., Rani, L., Tiwari, R.G., Sharma, T., Sarangi, P.K. (2021). Honey Encryption: Fortification Beyond the Brute-Force Impediment. In: Manik, G., Kalia, S., Sahoo, S.K., Sharma, T.K., Verma, O.P. (eds) Advances in Mechanical Engineering. Lecture Notes in Mechanical Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-16-0942-8_64
Download citation
DOI: https://doi.org/10.1007/978-981-16-0942-8_64
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0941-1
Online ISBN: 978-981-16-0942-8
eBook Packages: EngineeringEngineering (R0)