Mosul University
  • Register
  • Login
  • العربیة

AL-Rafidain Journal of Computer Sciences and Mathematics

Notice

As part of Open Journals’ initiatives, we create website for scholarly open access journals. If you are responsible for this journal and would like to know more about how to use the editorial system, please visit our website at https://ejournalplus.com or
send us an email to info@ejournalplus.com

We will contact you soon

  1. Home
  2. Volume 16, Issue 1
  3. Authors

Current Issue

By Issue

By Subject

Keyword Index

Author Index

Indexing Databases XML

About Journal

Aims and Scope

Editorial Board

Editorial Staff

Publication Ethics

Indexing and Abstracting

Related Links

Peer Review Process

News

Honey Encryption Security Techniques: A Review Paper

    Ammar Abdul Majed Gharbi Ahmed Sami Nori

AL-Rafidain Journal of Computer Sciences and Mathematics, 2022, Volume 16, Issue 1, Pages 1-14
10.33899/csmj.2022.174390

  • Show Article
  • Download
  • Cite
  • Statistics
  • Share

Abstract

From time to time, we hear in the news about a breach or attack on some well-known companies as just news, but it is a serious problem because it is the privacy of citizens, their money in trade and managing their businesses and projects. In this paper, we offer a review of the honey encryption planner. Honey Encryption is the encryption system that ensures flexibility versus the brute-force attack through the provision of plain reasonable text, but false for each key is invalid utilized by a trespasser to decrypt a message, two key areas are open it is difficult to create a compelling message trap that's perfect enough to deceive the striker even when he believes that he has the message in its original form.
 The next problem, the typo issue, where a valid phony plain text seem to a lawful user when he accidentally enters the wrong key. Our goal is to have more satisfaction disguised tricks that are perfect enough to prevent a trespasser from getting the original message, We also need new security methods because the attackers are looking for new ways to attack the systems, so we proposed a new way to protect messages and passwords well and difficult to break and take all the possibilities of attack, including the brute-force, and then the data is hidden in an image with a public secret key.
Keywords:
    honey encryption ElGamal algorithm Steganography brute force attack typo problem honeyword DTE
Main Subjects:
  • Computer Security
  • PDF (1652 K)
  • XML
(2022). Honey Encryption Security Techniques: A Review Paper. AL-Rafidain Journal of Computer Sciences and Mathematics, 16(1), 1-14. doi: 10.33899/csmj.2022.174390
Ammar Abdul Majed Gharbi; Ahmed Sami Nori. "Honey Encryption Security Techniques: A Review Paper". AL-Rafidain Journal of Computer Sciences and Mathematics, 16, 1, 2022, 1-14. doi: 10.33899/csmj.2022.174390
(2022). 'Honey Encryption Security Techniques: A Review Paper', AL-Rafidain Journal of Computer Sciences and Mathematics, 16(1), pp. 1-14. doi: 10.33899/csmj.2022.174390
Honey Encryption Security Techniques: A Review Paper. AL-Rafidain Journal of Computer Sciences and Mathematics, 2022; 16(1): 1-14. doi: 10.33899/csmj.2022.174390
  • RIS
  • EndNote
  • BibTeX
  • APA
  • MLA
  • Harvard
  • Vancouver
  • Article View: 234
  • PDF Download: 221
  • LinkedIn
  • Twitter
  • Facebook
  • Google
  • Telegram
  • Home
  • Glossary
  • News
  • Aims and Scope
  • Privacy Policy
  • Sitemap
This journal is licensed under a Creative Commons Attribution 4.0 International (CC-BY 4.0)

Powered by eJournalPlus