UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 13 | Issue 4 | April 2026

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 10 Issue 3
March-2023
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2303301


Registration ID:
510126

Page Number

d1-d14

Share This Article


Jetir RMS

Title

HONEY ENCRYPTION ALGORITHMS TO PROTECT DATA

Abstract

A novel encryption method called honey encryption ensures that messages decoded with false keys produce messages that appear to be real, protecting users from brute force attacks. In this work, we demonstrate our implementation of honey encryption and use practical real-world examples like credit cards and fundamental text messaging to illustrate its utility. We also add public-key encryption capability to the fundamental honey encryption technique. Finally, we go over the restrictions. We encountered additional requirements for bolstering our applications throughout implementation. Users typically choose well-known passwords that are simple to remember and decipher. In databases, passwords are frequently secured using cryptographic hash functions. When the passwords are weak, there are various hash-cracking tools that can quickly decrypt these hashes. Weak passwords are an issue for hashing, but they also compromise the security of Password-Based Encryption (PBE) schemes, where a password is used to encrypt the message. PBE is mostly utilized in password managers and is used to protect sensitive data. The Password Manager (PM) creates a small database of passwords and the accounts they belong to. This database is encrypted using a user-selected master Password, making the Master Password susceptible to brute force attacks. In this review work, we have examined Honey Encryption (HE), a novel encryption technique that offers resistance to brute force attacks by assuring that messages decoded with false keys produce messages that appear to be genuine.

Key Words

Cite This Article

"HONEY ENCRYPTION ALGORITHMS TO PROTECT DATA ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.10, Issue 3, page no.d1-d14, March-2023, Available :http://www.jetir.org/papers/JETIR2303301.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"HONEY ENCRYPTION ALGORITHMS TO PROTECT DATA ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.10, Issue 3, page no. ppd1-d14, March-2023, Available at : http://www.jetir.org/papers/JETIR2303301.pdf

Publication Details

Published Paper ID: JETIR2303301
Registration ID: 510126
Published In: Volume 10 | Issue 3 | Year March-2023
DOI (Digital Object Identifier):
Page No: d1-d14
Country: thiruvarur district, Tamil nadu, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000452

Print This Page

Current Call For Paper

Jetir RMS