2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2016
DOI: 10.1109/icassp.2016.7472064
|View full text |Cite
|
Sign up to set email alerts
|

Honey chatting: A novel instant messaging system robust to eavesdropping over communication

Abstract: There have been many efforts to strengthen security of Instant Messaging (IM) system. One of the typical technologies is the conventional message encryption using a secret or private key. However, the key is fundamentally vulnerable to a bruteforce attack, causing to acquire the original message. In this respect, a countermeasure was suggested as the way to generating plausible-looking but fake plaintexts, which is called Honey Encryption (HE). In this paper, we present a HE-based statistical scheme and design… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…The Levenshtein distance between the number of bit changes in the plaintext data and the decoy message of the CDM is compared with Yoon et al [33], Kim and Yoon [44] and Beaunardeau et al [45] as depicted in Table 4. The following related works were selected because they use similar dataset.…”
Section: (Iii) Statistical Evaluation Based On Levenshtein Distance (Ld)mentioning
confidence: 99%
“…The Levenshtein distance between the number of bit changes in the plaintext data and the decoy message of the CDM is compared with Yoon et al [33], Kim and Yoon [44] and Beaunardeau et al [45] as depicted in Table 4. The following related works were selected because they use similar dataset.…”
Section: (Iii) Statistical Evaluation Based On Levenshtein Distance (Ld)mentioning
confidence: 99%
“…By adopting the honey encryption scheme, the defender can defeat brute-force attackers when they try to guess keys randomly. A recent application called Honey Chatting has been proposed in [36] to combat eavesdropping attacks by applying honey encryption to chatting applications. Honey encryption ensures that an attacker will not be able to verify if a right key is used to decrypt a chatting message thus cannot determine the exact content of the message.…”
Section: Cryptography Based Approachmentioning
confidence: 99%
“…Others have acknowledged the importance of cryptography in communication. According to Kim and Yoon [25], some cryptosystems used in IM are vulnerable to brute-force attacks, specially those with short keys, or that are based in passwords, as users' choices are commonly weak. To overcome this problem, the authors propose a Honey Encryption system for use in Instant Messaging, in which inputting the wrong key will give a plausible, yet incorrect, plaintext.…”
Section: Related Workmentioning
confidence: 99%