University of Jyväskylä | JYX Digital Repository

  • English  | Give feedback |
    • suomi
    • English
 
  • Login
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  • JYX
  • Opinnäytteet
  • Pro gradu -tutkielmat
  • View Item
JYX > Opinnäytteet > Pro gradu -tutkielmat > View Item

Honey Encryption : implementation challenges and solutions

Thumbnail
View/Open
621.6Kb

Downloads:  
Show download detailsHide download details  
Authors
Lindholm, Ronja
Date
2019
Discipline
TietotekniikkaMathematical Information Technology
Copyright
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.

 
Most encryption techniques have one essential problem: they are vulnerable to brute-force attacks. In 2014, a new defence mechanism was introduced against brute-force attack and this mechanism was called Honey Encryption. Honey Encryption has been cited in several articles and it has demonstrated potential to be an additional security method alongside conventional encryption. This thesis will offer an overview of the current situation of Honey Encryption and it starts by explaining and discussing the challenges that have been brought up. These challenges include, among other things, the difficulty of producing the honey messages and identifying user typos from an attack. Some of the solution ideas that have been introduced since the introduction of Honey Encryption are discussed as well. There have been some new types of data that could be used with Honey Encryption, such as genomes and multi-dimensional data such as images and videos. These data types are discussed in connection with the use of Honey Encryption. As a last measure to provide overall understanding of the current situation of HE, this thesis provides an implementation model for Honey Encryption in a theoretical level, with some practical programming parts as well. The model is offered by going through the Honey Encryption scheme step by step. Together, these three steps: challenges, new data types, and an implementation model are meant to give a broad view of the situation of Honey Encryption gathered in one place. ...
Keywords
honey encryption cryptography brute-force decoy sweetword password-based encryption symmetric cryptography salaus tietoturva encryption data security
URI

http://urn.fi/URN:NBN:fi:jyu-201906042936

Metadata
Show full item record
Collections
  • Pro gradu -tutkielmat [23358]

Related items

Showing items with similar title or keywords.

  • Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives 

    Kronqvist, Jyrki; Lehto, Martti (Academic Conferences and Publishing International Limited, 2015)
    A shift towards use of public cloud services is ongoing and more and more enterprises will start to use them in the near future. As public cloud services certainly promise to deliver many benefits, this new way of delivering ...
  • Detection of distributed denial-of-service attacks in encrypted network traffic 

    Hyvärinen, Mikko (2016)
    Tausta: Hajautetut palvelunestohyökkäykset ovat jo kaksi vuosikymmentä vanhoja. Useita strategioita on kehitetty taistelemaan niiden kasvavaa määrää vastaan vuosien varrella. Sovelluskerroksen protokollien hyökkäykset ...
  • Etäyhteydet yrityksen tietoverkkoon tietoturvallisuuden näkökulmasta 

    Kankaanpää, Jorma (2005)
  • Password usage, management, and perceptions of expert users 

    Temonen, Saku (2020)
    Ihmisten tietoturva kautta maailman riippuu salasanojen varassa, mutta salasana todennusmenetelmänä toimii tarkoitetulla tavalla vain, jos käyttäjät noudattavat turvallisia salasanakäytänteitä. Siitä huolimatta tietoturvan ...
  • Massadatan hyödyntäminen tietoturvallisuuden näkökulmasta 

    Niskanen, Tatu (2021)
    Massadata, johon viitataan yleisesti myös käsitteellä Big data, on kokoelma dataa, joka on kooltaan todella suuri, se on luonteeltaan monipuolista ja hajanaista, ja sitä tulee nopeasti lisää. Massadata aiheuttaa organisaatioille ...
  • Browse materials
  • Browse materials
  • Articles
  • Conferences and seminars
  • Electronic books
  • Historical maps
  • Journals
  • Tunes and musical notes
  • Photographs
  • Presentations and posters
  • Publication series
  • Research reports
  • Research data
  • Study materials
  • Theses

Browse

All of JYXCollection listBy Issue DateAuthorsSubjectsPublished inDepartmentDiscipline

My Account

Login

Statistics

View Usage Statistics
  • How to publish in JYX?
  • Self-archiving
  • Publish Your Thesis Online
  • Publishing Your Dissertation
  • Publication services

Open Science at the JYU
 
Data Protection Description

Accessibility Statement

Unless otherwise specified, publicly available JYX metadata (excluding abstracts) may be freely reused under the CC0 waiver.
Open Science Centre