A Review on Common Encryption Techniques to Brute Force Shielded Technique: Honey Encryption
Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 12)Publication Date: 2016-03-01
Authors : Taunk Mayur G; Laxmi Saraswat;
Page : 203-204
Keywords : PBE (Password Based Encryption); Conventional Encryption Techniques; DTE (Distribution Transforming Encoders); HE (Honey Encryption); Brute Force; One-Time Pad.;
Abstract
In today�s era of information technology beginning from social network to most complex and secure transactions are going on the internet, when the internet technology begun it was accompanied by data threats and security breaches, then came the cryptography algorithms which were good enough to protect the treats and breaches, as the time elapsed we are in a era where straightforward mathematical cryptography techniques are not enough to secure our transactions/data on network, a new tricky technology is needed. This paper presents the straightforward algorithms and the attacks which they are vulnerable to and a review of a tricky cryptography algorithm Honey Encryption.
Other Latest Articles
- Enhancing the Efficiency of the Website by Mining Web Server Log Files
- A Review on Skirt to Dished end Joint of Pressure Vessel
- Comparative Network Intrusion Detection technique DPI-AD for Regular Expression Detection in wireless Ad-hoc network
- A Review on Reconfigurable Multisoft core architecture on FPGA
- A Review on Reconfigurable PLC Development, Synthesis & Implementation for Industrial Application
Last modified: 2016-02-16 20:53:02