Honey Encryption New Report - 1
Honey Encryption New Report - 1
Honey Encryption New Report - 1
Abstract— Many corporations and companies now encrypt the attacker will be able to tell that this bogus message is not
their data before sending it over an insecure network. Although the genuine one. A brute force attack can use HE to decode
many hackers save private information by using various attack a ciphertext into a meaningful false plaintext that is not the
tactics, such as brute force attacks, many of them do not even original communication. It is therefore protected from brute
know it. Password-based encryption algorithms (PBE) are used force attacks by this encryption. It is the core component of
by organizations to protect their private information. As a HE, and it is responsible for mapping the message space
result of weak or repeated passwords provided by users, the into the seed space of a binary bits string via a DTE. After
present PBE techniques are vulnerable to brute force assaults. the ciphertext has been encrypted, the key and seed are
As a result of the weakness of password-based encryption XORed. Once the seed location has been determined, DTE
algorithms, we developed honey encryption as a solution (HE). may map it back to its original plaintext message. This
Text-based messages can be protected from brute-force threats technique can fool attackers even if the key is wrong [4]. In
by using honey encryption or honeywords. On the other hand, the current HE algorithm, the message space can only
the standard HE has a message size constraint in the DTE accommodate four messages at any given time.
process and a storage overhead problem in the honeywords
production process. As a result, our proposed honey encryption
method employs a discrete distribution function in the DTE
process instead of a cumulative distribution function to address II. Associated Work
message space constraints. For the most part, encryption methods rely on
passwords (PBE). There is a risk that these systems will be
Keywords— Cryptography, Honey Encryption (HE), Honey attacked by the use of many guesses. As a result, Honey
Objects, Brute-force Attack, Password Cracking, Password-based encryption [4] aims to solve this problem by making it more
Encryption (PBE), Distribution-Transforming Encoder (DTE) difficult for attackers to obtain access to sensitive information
by guessing passwords. A valid-looking decrypted message is
I. Introduction
generated for each candidate key by the system. As a result, it
is difficult to determine which
There are many companies across the world that coding scheme that can produce bogus plaintext messages
desire to send private communications in a non-secure way. [3]. As a result of the meaninglessness of these messages,
Since they want to protect their confidential information,
they employ end-to-end encryption services. It is possible to
read encrypted messages using the end-to-end encryption
technique [1]. Most businesses utilise the password-based
encryption (PBE) technique since users can pick and
remember their keys. Because hackers may quickly decrypt
the message to locate the keys via various methods, the
present PBE algorithms are ineffective. As a result, apps and
websites that employ encryption algorithms are vulnerable
to brute force assaults [2]. There are several approaches that
researchers are using in order to prevent brute force assaults
from occurring. Many modern systems have implemented
the two countermeasure approaches against brute force
assaults. The first way is to make it more difficult for
attackers to timing the assault. Many systems secure data by
increasing key length pseudorandom number generator as
the time complexity grows. Hashing algorithms such as
MD5 and SHA256 were developed to speed up
computations [3]. Although the brute force approach can
expose the secret in a polynomial time, it is not
recommended.
For this reason, honeywords are employed in many
cryptosystems as a way to secure the keys. Because
honeywords are stored in the password files, the attacker
will have difficulty stealing them if the system employs the
honeyword generating technique. To attack the hashing
password file, attackers employ fake passwords or
honeywords, namely brute force attacks. The second
technique uses the ASCII code table to create a statistical
password is valid. Protect sensitive data in a variety of honey encryption technique by employing newer
applications by using honey encryption. honeyword generation and hashing algorithms.
For instance, honey encryption tricks an attacker
into believing that an erroneously guessed key is legitimate. III. Literature Overview
Because of the storage overhead and message space
limitation, the existing system can work. Our solution to It's essential to have a basic grasp of encryption
the message capacity constraint and storage overhead techniques to appreciate how Honey encryption originated.
problem is a new system that we've developed. With this An adversary conducting a brute-force attack to get the key
new honeywords technique, storage costs can be cut in half. used for encrypting a message receives trash or an error
Aside from that, it's easy to fix the typo safety issue. We signal as the expected result when attempting an incorrect
utilise a unique hashing and salting technique to secure key in traditional password-based encryption. If the key is
password data. Compared to the conventional MD5 hashing wrong, this output serves as a warning sign, and he
method and the hashing algorithm using differential continues his search until he finds something credible that
masking and salt, this algorithm has a shorter hashing and may be the plaintext. Because of the uneven distribution, he
salting time. Our system can solve the message size rapidly discards the message during his attack. There's a
limitation problem using DTE compared to the previous good chance that he'll be able to retrieve the
message/plaintext with additional time. Fig. 1 demonstrates
how a password-based encryption method responds to a
brute force assault.
A. Strong Encoder Criteria
Fig-2
used in the actual world are needed to model attacker will have to travel through a probability
human language. To be effective, a deceptive distribution that isn't predicted [5].
message must be persuasive. So that the attacker
may be deceived, it must be complicated for him to
identify the difference between a decoy message A. Honey Encryption (HE) Scheme:
and an actual one.
When it comes to this construct's implementation,
As a result, the DTE must mimic human speech it's all about the message space, where all possible password
while concealing the actual text's structure. It is values are stored. To begin with, there's a Distribution-
essential to understand the context and substance Transforming Encoder (DTE), which encodes or decodes
of the language used by humans in emails and
other human-generated documents. Better security the message space using the functions given. Using a given
is provided by an encoder that does not disclose value of n, the possible values are mapped to a seed value.
the message/internal plaintext's backbone. As a result, seeds are distributed based on the chance of
finding the password [3]. The seeds are assigned a greater
probability than the improbable passwords, just as they are
B. Introducing Salt to Hashes for the more common passwords.
References
[1] Infosec Resources. 2021. Honey Encryption - Infosec
Resources. [online] Available at:
<https://resources.infosecinstitute.com/topic/honey-encryption/>
[Accessed 16 August 2021].