DocumentCode :
24462
Title :
Honey Encryption: Encryption beyond the Brute-Force Barrier
Author :
Juels, Ari ; Ristenpart, Thomas
Volume :
12
Issue :
4
fYear :
2014
fDate :
July-Aug. 2014
Firstpage :
59
Lastpage :
62
Abstract :
Honey encryption (HE) addresses the challenge of encrypting messages using keys that are vulnerable to guessing attacks, such as the passwords selected by ordinary users. HE creates a ciphertext that, when decrypted with an incorrect key or password, yields a valid-looking but bogus message. So, attackers can´t tell when decryption has been successful. Counterintuitively, HE enables the encryption of a message using a weak password such that even a strong attacker--one with unlimited computing power--can´t decrypt the message with certainty. You can use HE to encrypt the list of passwords in a password manager, credentials used in SSH (Secure Shell), and so on. HE fuses the creative use of honey objects and decoys in system security with the rigor and principled application imparted by cryptography.
Keywords :
cryptography; HE; SSH; bogus message; brute-force barrier; cryptography; honey encryption; password manager; secure shell; unlimited computing power; weak password; Computer security; Databases; Encoding; Encryption; Privacy; computer security; cryptography; cybercrime; encryption; hackers; honey encryption; one-time pad; password-based encryption; security;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2014.67
Filename :
6876246
Link To Document :
بازگشت