High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Review on Common Encryption Techniques to Brute Force Shielded Technique: Honey Encryption

Author(s):

Taunk Mayur G , HJD institute of Technical Education and Research; Laxmi Saraswat, HJD institute of Technical Education and Research

Keywords:

PBE (Password Based Encryption), Conventional Encryption Techniques, DTE (Distribution Transforming Encoders), HE (Honey Encryption), Brute Force, One-Time Pad.

Abstract

In today’s era of information technology beginning from social network to most complex and secure transactions are going on the internet, when the internet technology begun it was accompanied by data threats and security breaches, then came the cryptography algorithms which were good enough to protect the treats and breaches, as the time elapsed we are in a era where straightforward mathematical cryptography techniques are not enough to secure our transactions/data on network, a new tricky technology is needed. This paper presents the straightforward algorithms and the attacks which they are vulnerable to and a review of a tricky cryptography algorithm Honey Encryption.

Other Details

Paper ID: IJSRDV3I120002
Published in: Volume : 3, Issue : 12
Publication Date: 01/03/2016
Page(s): 203-204

Article Preview

Download Article