dc.contributor.advisor | Costin, Andrei | |
dc.contributor.author | Lindholm, Ronja | |
dc.date.accessioned | 2019-06-04T11:39:19Z | |
dc.date.available | 2019-06-04T11:39:19Z | |
dc.date.issued | 2019 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/64328 | |
dc.description.abstract | Most encryption techniques have one essential problem: they are vulnerable to brute-force attacks. In 2014, a new defence mechanism was introduced against brute-force attack and this mechanism was called Honey Encryption. Honey Encryption has been cited in several articles and it has demonstrated potential to be an additional security method alongside conventional encryption. This thesis will offer an overview of the current situation of Honey Encryption and it starts by explaining and discussing the challenges that have been brought up. These challenges include, among other things, the difficulty of producing the honey messages and identifying user typos from an attack. Some of the solution ideas that have been introduced since the introduction of Honey Encryption are discussed as well. There have been some new types of data that could be used with Honey Encryption, such as genomes and multi-dimensional data such as images and videos. These data types are discussed in connection with the use of Honey Encryption. As a last measure to provide overall understanding of the current situation of HE, this thesis provides an implementation model for Honey Encryption in a theoretical level, with some practical programming parts as well. The model is offered by going through the Honey Encryption scheme step by step. Together, these three steps: challenges, new data types, and an implementation model are meant to give a broad view of the situation of Honey Encryption gathered in one place. | en |
dc.format.extent | 61 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en | |
dc.rights | In Copyright | en |
dc.subject.other | honey encryption | |
dc.subject.other | cryptography | |
dc.subject.other | brute-force | |
dc.subject.other | decoy | |
dc.subject.other | sweetword | |
dc.subject.other | password-based encryption | |
dc.subject.other | symmetric cryptography | |
dc.title | Honey Encryption : implementation challenges and solutions | |
dc.type | master thesis | |
dc.identifier.urn | URN:NBN:fi:jyu-201906042936 | |
dc.type.ontasot | Pro gradu -tutkielma | fi |
dc.type.ontasot | Master’s thesis | en |
dc.contributor.tiedekunta | Informaatioteknologian tiedekunta | fi |
dc.contributor.tiedekunta | Faculty of Information Technology | en |
dc.contributor.laitos | Informaatioteknologia | fi |
dc.contributor.laitos | Information Technology | en |
dc.contributor.yliopisto | Jyväskylän yliopisto | fi |
dc.contributor.yliopisto | University of Jyväskylä | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.coar | http://purl.org/coar/resource_type/c_bdcc | |
dc.rights.accesslevel | openAccess | |
dc.type.publication | masterThesis | |
dc.contributor.oppiainekoodi | 602 | |
dc.subject.yso | salaus | |
dc.subject.yso | tietoturva | |
dc.subject.yso | encryption | |
dc.subject.yso | data security | |
dc.format.content | fulltext | |
dc.rights.url | https://rightsstatements.org/page/InC/1.0/ | |
dc.type.okm | G2 | |