2017
DOI: 10.1155/2017/6760532
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Private Data by Honey Encryption

Abstract: The existing password-based encryption (PBE) methods that are used to protect private data are vulnerable to brute-force attacks. The reason is that, for a wrongly guessed key, the decryption process yields an invalid-looking plaintext message, confirming the invalidity of the key, while for the correct key it outputs a valid-looking plaintext message, confirming the correctness of the guessed key. Honey encryption helps to minimise this vulnerability. In this paper, we design and implement the honey encryptio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 7 publications
0
14
0
Order By: Relevance
“…Figure 4d shows U chem,EAM Nb in NbTaV as an example of the magnitude and localization to atoms in the dislocation core. Table 2: Solute misfit volumes and elastic constants for the alloys studied, as computed using Density Functional Theory (data kindly provided by Dr. B. Yin [39], using methods detailed in Ref. [40]), Vegard's law (misfits) or rule-of-mixtures ROM (elastic constants), the true random alloy described by EAM potentials, and the average-alloy EAM potential.…”
Section: Theory Vs Experimentsmentioning
confidence: 99%
“…Figure 4d shows U chem,EAM Nb in NbTaV as an example of the magnitude and localization to atoms in the dislocation core. Table 2: Solute misfit volumes and elastic constants for the alloys studied, as computed using Density Functional Theory (data kindly provided by Dr. B. Yin [39], using methods detailed in Ref. [40]), Vegard's law (misfits) or rule-of-mixtures ROM (elastic constants), the true random alloy described by EAM potentials, and the average-alloy EAM potential.…”
Section: Theory Vs Experimentsmentioning
confidence: 99%
“…However, the available encryption algorithms are considered to be secure. But depending on the time and computing power, they are also susceptible to intrusions [30]. The present encryption techniques are also beset with vulnerabilities, for instance, when decrypting with a wrongly guessed key, they yield an invalid looking plaintext message, while decrypting with the right key, they give a valid-looking plaintext message, confirming that the ciphertext message is correctly decrypted [30].…”
Section: Materials and Methods Data Encryption Based On Attribute Basedmentioning
confidence: 97%
“…However, the available encryption algorithms are considered to be secure. But depending on the time and computing power, they are also susceptible to intrusions (Yin, lska & Zhou, 2017). The present encryption techniques are also beset with vulnerabilities, for instance, when decrypting with a wrongly guessed key, they yield an invalid looking plaintext message, while decrypting with the right key, they give a valid-looking plaintext message, confirming that the cipher-text message is correctly decrypted (Yin, lska & Zhou, 2017).…”
Section: Data Encryption Based On Attribute Based Honey Encryption (Amentioning
confidence: 96%