University of Jyväskylä | JYX Digital Repository

  • English  | Give feedback |
    • suomi
    • English
 
  • Login
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  • JYX
  • Opinnäytteet
  • Pro gradu -tutkielmat
  • View Item
JYX > Opinnäytteet > Pro gradu -tutkielmat > View Item

Honey Encryption : implementation challenges and solutions

Thumbnail
View/Open
621.6 Kb

Downloads:  
Show download detailsHide download details  
Authors
Lindholm, Ronja
Date
2019
Discipline
TietotekniikkaMathematical Information Technology
Copyright
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.

 
Most encryption techniques have one essential problem: they are vulnerable to brute-force attacks. In 2014, a new defence mechanism was introduced against brute-force attack and this mechanism was called Honey Encryption. Honey Encryption has been cited in several articles and it has demonstrated potential to be an additional security method alongside conventional encryption. This thesis will offer an overview of the current situation of Honey Encryption and it starts by explaining and discussing the challenges that have been brought up. These challenges include, among other things, the difficulty of producing the honey messages and identifying user typos from an attack. Some of the solution ideas that have been introduced since the introduction of Honey Encryption are discussed as well. There have been some new types of data that could be used with Honey Encryption, such as genomes and multi-dimensional data such as images and videos. These data types are discussed in connection with the use of Honey Encryption. As a last measure to provide overall understanding of the current situation of HE, this thesis provides an implementation model for Honey Encryption in a theoretical level, with some practical programming parts as well. The model is offered by going through the Honey Encryption scheme step by step. Together, these three steps: challenges, new data types, and an implementation model are meant to give a broad view of the situation of Honey Encryption gathered in one place. ...
Keywords
honey encryption cryptography brute-force decoy sweetword password-based encryption symmetric cryptography salaus tietoturva encryption data security
URI

http://urn.fi/URN:NBN:fi:jyu-201906042936

Metadata
Show full item record
Collections
  • Pro gradu -tutkielmat [24854]

Related items

Showing items with similar title or keywords.

  • Adopting encryption to protect confidential data in public clouds: A review of solutions, implementation challenges and alternatives 

    Kronqvist, Jyrki; Lehto, Martti (Academic Conferences and Publishing International Limited, 2015)
    A shift towards use of public cloud services is ongoing and more and more enterprises will start to use them in the near future. As public cloud services certainly promise to deliver many benefits, this new way of delivering ...
  • Detection of distributed denial-of-service attacks in encrypted network traffic 

    Hyvärinen, Mikko (2016)
    Tausta: Hajautetut palvelunestohyökkäykset ovat jo kaksi vuosikymmentä vanhoja. Useita strategioita on kehitetty taistelemaan niiden kasvavaa määrää vastaan vuosien varrella. Sovelluskerroksen protokollien hyökkäykset ...
  • Encryption and Generation of Images for Privacy-Preserving Machine Learning in Smart Manufacturing 

    Terziyan, Vagan; Malyk, Diana; Golovianko, Mariia; Branytskyi, Vladyslav (Elsevier, 2023)
    Current advances in machine (deep) learning and the exponential growth of data collected by and shared between smart manufacturing processes give a unique opportunity to get extra value from that data. The use of public ...
  • Too many passwords? : How understanding our memory can increase password memorability 

    Woods, Naomi; Siponen, Mikko (Academic Press, 2018)
    Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such ...
  • Improving the security of multiple passwords through a greater understanding of the human memory 

    Woods, Naomi (University of Jyväskylä, 2016)
    Multiple passwords are an increasing security issue that will only get worse with time. One of the major factors that compromise multiple passwords is users’ memory, and the behaviors they adopt to compensate for its ...
  • Browse materials
  • Browse materials
  • Articles
  • Conferences and seminars
  • Electronic books
  • Historical maps
  • Journals
  • Tunes and musical notes
  • Photographs
  • Presentations and posters
  • Publication series
  • Research reports
  • Research data
  • Study materials
  • Theses

Browse

All of JYXCollection listBy Issue DateAuthorsSubjectsPublished inDepartmentDiscipline

My Account

Login

Statistics

View Usage Statistics
  • How to publish in JYX?
  • Self-archiving
  • Publish Your Thesis Online
  • Publishing Your Dissertation
  • Publication services

Open Science at the JYU
 
Data Protection Description

Accessibility Statement

Unless otherwise specified, publicly available JYX metadata (excluding abstracts) may be freely reused under the CC0 waiver.
Open Science Centre