Abstract | ||
---|---|---|
The existing password-based encryption (PBE) methods that are used to protect private data are vulnerable to brute-force attacks. The reason is that, for a wrongly guessed key, the decryption process yields an invalid-looking plaintext message, confirming the invalidity of the key, while for the correct key it outputs a valid-looking plaintext message, confirming the correctness of the guessed key. Honey encryption helps to minimise this vulnerability. In this paper, we design and implement the honey encryption mechanisms and apply it to three types of private data including Chinese identification numbers, mobile phone numbers, and debit card passwords. We evaluate the performance of our mechanism and propose an enhancement to address the overhead issue. We also show lessons learned from designing, implementing, and evaluating the honey encryption mechanism. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1155/2017/6760532 | SECURITY AND COMMUNICATION NETWORKS |
Field | DocType | Volume |
Multiple encryption,Computer security,Computer science,Honey Encryption,Attribute-based encryption,Computer network,Encryption,Probabilistic encryption,40-bit encryption,On-the-fly encryption,Plaintext | Journal | 2017 |
ISSN | Citations | PageRank |
1939-0114 | 0 | 0.34 |
References | Authors | |
1 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Wei Yin | 1 | 25 | 13.34 |
Jadwiga Indulska | 2 | 2092 | 146.96 |
Hongjian Zhou | 3 | 2 | 1.37 |