2019
DOI: 10.11591/ijece.v9i3.pp1871-1878
|View full text |Cite
|
Sign up to set email alerts
|

Modified honey encryption scheme for encoding natural language message

Abstract: Conventional encryption schemes are susceptible to brute-force attacks. This is because bytes encode utf8 (or ASCII) characters. Consequently, an adversary that intercepts a ciphertext and tries to decrypt the message by brute-forcing with an incorrect key can filter out some of the combinations of the decrypted message by observing that some of the sequences are a combination of characters which are distributed non-uniformly and form no plausible meaning. Honey encryption (HE) scheme was proposed to curtail t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 18 publications
0
12
0
Order By: Relevance
“…The three building blocks of a blockchain are shown in the Figure 1. -Encryption and cryptography: These ensure security services such as authentication, authorization, non-repudiation and confidentiality [8,9]. -Consensus mechanisms: These are the algorithms used to decide, whether, a new block of validated transactions should be added to the chain or rejected.…”
Section: Building Blocks Of a Blockchainmentioning
confidence: 99%
“…The three building blocks of a blockchain are shown in the Figure 1. -Encryption and cryptography: These ensure security services such as authentication, authorization, non-repudiation and confidentiality [8,9]. -Consensus mechanisms: These are the algorithms used to decide, whether, a new block of validated transactions should be added to the chain or rejected.…”
Section: Building Blocks Of a Blockchainmentioning
confidence: 99%
“…Honey encryption scheme (HE) is modified to support the encoding of natural language processing techniques. This resulted in producing syntactically correct messages that will help to deceive the attacker trying to decrypt a cipher text with incorrect keys [23]. N-tier modelling of robust key management and a cost-effective security paradigm with 2-tier model to safeguard cloud data with effective authentication are discussed in [24,25].…”
Section: Literature Surveymentioning
confidence: 99%
“…The exponential growth in the use of computers coupled with the need to protect confidential and essential information from unauthorized and illegal users makes the security of digital data a great challenge in the worldwide communication network [1]. Encryption is used to secure data and protect the confidentiality of data during transmission over the network [2][3].…”
Section: Introductionmentioning
confidence: 99%