Honey Encryption Security Techniques: A Review Paper
Autor: | Ammar Gharbi, Ahmed Nori |
---|---|
Jazyk: | Arabic<br />English |
Rok vydání: | 2022 |
Předmět: | |
Zdroj: | Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 16, Iss 1, Pp 1-14 (2022) |
Druh dokumentu: | article |
ISSN: | 1815-4816 2311-7990 |
DOI: | 10.33899/csmj.2022.174390 |
Popis: | From time to time, we hear in the news about a breach or attack on some well-known companies as just news, but it is a serious problem because it is the privacy of citizens, their money in trade and managing their businesses and projects. In this paper, we offer a review of the honey encryption planner. Honey Encryption is the encryption system that ensures flexibility versus the brute-force attack through the provision of plain reasonable text, but false for each key is invalid utilized by a trespasser to decrypt a message, two key areas are open it is difficult to create a compelling message trap that's perfect enough to deceive the striker even when he believes that he has the message in its original form. The next problem, the typo issue, where a valid phony plain text seem to a lawful user when he accidentally enters the wrong key. Our goal is to have more satisfaction disguised tricks that are perfect enough to prevent a trespasser from getting the original message, We also need new security methods because the attackers are looking for new ways to attack the systems, so we proposed a new way to protect messages and passwords well and difficult to break and take all the possibilities of attack, including the brute-force, and then the data is hidden in an image with a public secret key. |
Databáze: | Directory of Open Access Journals |
Externí odkaz: |