ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Review on Common Encryption Techniques to Brute Force Shielded Technique: Honey Encryption

Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 12)

Publication Date:

Authors : ; ;

Page : 203-204

Keywords : PBE (Password Based Encryption); Conventional Encryption Techniques; DTE (Distribution Transforming Encoders); HE (Honey Encryption); Brute Force; One-Time Pad.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In today�s era of information technology beginning from social network to most complex and secure transactions are going on the internet, when the internet technology begun it was accompanied by data threats and security breaches, then came the cryptography algorithms which were good enough to protect the treats and breaches, as the time elapsed we are in a era where straightforward mathematical cryptography techniques are not enough to secure our transactions/data on network, a new tricky technology is needed. This paper presents the straightforward algorithms and the attacks which they are vulnerable to and a review of a tricky cryptography algorithm Honey Encryption.

Last modified: 2016-02-16 20:53:02