Honey Encryption : implementation challenges and solutions
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Most encryption techniques have one essential problem: they are vulnerable to brute-force attacks. In 2014, a new defence mechanism was introduced against brute-force attack and this mechanism was called Honey Encryption. Honey Encryption has been cited in several articles and it has demonstrated potential to be an additional security method alongside conventional encryption. This thesis will offer an overview of the current situation of Honey Encryption and it starts by explaining and discussing the challenges that have been brought up. These challenges include, among other things, the difficulty of producing the honey messages and identifying user typos from an attack. Some of the solution ideas that have been introduced since the introduction of Honey Encryption are discussed as well. There have been some new types of data that could be used with Honey Encryption, such as genomes and multi-dimensional data such as images and videos. These data types are discussed in connection with the use of Honey Encryption. As a last measure to provide overall understanding of the current situation of HE, this thesis provides an implementation model for Honey Encryption in a theoretical level, with some practical programming parts as well. The model is offered by going through the Honey Encryption scheme step by step. Together, these three steps: challenges, new data types, and an implementation model are meant to give a broad view of the situation of Honey Encryption gathered in one place. ...
MetadataShow full item record
- Pro gradu -tutkielmat 
Showing items with similar title or keywords.
Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives Kronqvist, Jyrki; Lehto, Martti (Academic Conferences and Publishing International Limited, 2015)A shift towards use of public cloud services is ongoing and more and more enterprises will start to use them in the near future. As public cloud services certainly promise to deliver many benefits, this new way of delivering ...
Hyvärinen, Mikko (2016)Tausta: Hajautetut palvelunestohyökkäykset ovat jo kaksi vuosikymmentä vanhoja. Useita strategioita on kehitetty taistelemaan niiden kasvavaa määrää vastaan vuosien varrella. Sovelluskerroksen protokollien hyökkäykset ...
Encryption and Generation of Images for Privacy-Preserving Machine Learning in Smart Manufacturing Terziyan, Vagan; Malyk, Diana; Golovianko, Mariia; Branytskyi, Vladyslav (Elsevier, 2023)Current advances in machine (deep) learning and the exponential growth of data collected by and shared between smart manufacturing processes give a unique opportunity to get extra value from that data. The use of public ...
Woods, Naomi; Siponen, Mikko (Academic Press, 2018)Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such ...
Woods, Naomi (University of Jyväskylä, 2016)Multiple passwords are an increasing security issue that will only get worse with time. One of the major factors that compromise multiple passwords is users’ memory, and the behaviors they adopt to compensate for its ...