Open Access   Article Go Back

Efficiency Analysis of Honey Encryption Algorithm

Bhoomika R1 , Gowda Deepa Narsimha2 , Abhishek V3 , Bharathi H4

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-09 , Page no. 12-14, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si9.1214

Online published on Apr 30, 2019

Copyright © Bhoomika R, Gowda Deepa Narsimha, Abhishek V, Bharathi H . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Bhoomika R, Gowda Deepa Narsimha, Abhishek V, Bharathi H, “Efficiency Analysis of Honey Encryption Algorithm,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.12-14, 2019.

MLA Style Citation: Bhoomika R, Gowda Deepa Narsimha, Abhishek V, Bharathi H "Efficiency Analysis of Honey Encryption Algorithm." International Journal of Computer Sciences and Engineering 07.09 (2019): 12-14.

APA Style Citation: Bhoomika R, Gowda Deepa Narsimha, Abhishek V, Bharathi H, (2019). Efficiency Analysis of Honey Encryption Algorithm. International Journal of Computer Sciences and Engineering, 07(09), 12-14.

BibTex Style Citation:
@article{R_2019,
author = {Bhoomika R, Gowda Deepa Narsimha, Abhishek V, Bharathi H},
title = {Efficiency Analysis of Honey Encryption Algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {07},
Issue = {09},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {12-14},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=945},
doi = {https://doi.org/10.26438/ijcse/v7i9.1214}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i9.1214}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=945
TI - Efficiency Analysis of Honey Encryption Algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - Bhoomika R, Gowda Deepa Narsimha, Abhishek V, Bharathi H
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 12-14
IS - 09
VL - 07
SN - 2347-2693
ER -

           

Abstract

In the field of cyber security, we have many algorithms that support cryptography. These algorithms are more prone to cyber-attacks and can be cracked easily by hash cracking tools. One of the methods to prevents these attacks is Honey Encryption technique that has gained popularity in recent years. This method provides another layer of protection when the intruder tries to hack an account with bogus data. In this paper, we are efficiently increasing the probability of Honey Encryption by generating more hash keys(password)using python programming approach. Honey encryption helps in minimization of vulnerability. We have designed an algorithm which eventually increases the buffer size for the randomly generated passwords.

Key-Words / Index Term

Cryptography, Security, Password

References

[1] Mihir Bellare, Thomas Ristenpart, and Stefano Tessaro. Multi-instance security and its application to password-based cryptography. In Advances in Cryptology–CRYPTO 2012, pages 312–329. Springer Berlin Heidelberg, 2012.
[2] M. Preetha et al, International Journal of Computer Science and Mobile Computing Vol.2 Issue. 6, June- 2013, pg. 126-130
[3] M. Bakker and R. V. D. Jagt, “GPU-based password cracking. Technical report,” Univ. of Amsterdam, 2010
[4] Joseph Jaeger, Thomas Ristenpart, Qiang Tang. Honey Encryption Beyond Message Recovery Security. Presented in EUROCRYPT2016 pages 1 and 2, 2016.
[5] TIOBE Software Index (2011). "TIOBE Programming Community Index Python". 1
[6]"Programming Language Trends - O`Reilly Radar". Radar.oreilly.com. 2 August 2006.
[7] "The RedMonk Programming Language Rankings: January 2011 – ecosystems". Redmonk.com.
[8] H. Bojinov, E. Bursztein, X. Boyen, and D. Boneh. Kamouflage: loss-resistant password management. In ESORICS, pages 286–302, 2010.