Figure 2 - uploaded by Oludare E Omolara
Content may be subject to copyright.
An illustration of the setting of the Honey encryption scheme in a brute-force attack

An illustration of the setting of the Honey encryption scheme in a brute-force attack

Source publication
Article
Full-text available
We present a comprehensive survey of the Honey Encryption (HE) scheme. Honey Encryption is an encryption scheme that provides resilience against brute-force attack by serving up plausible-looking but fake plaintext for every invalid key used by an intruder to decrypt a message. Our goal is to furnish researchers with the framework of the scheme not...

Context in source publication

Context 1
... wins only if he can determine the message from the list of messages he recovered during his attack. Figure 2 shows a detailed explanation of how honey encryption scheme responds to a brute force attack. M. Honey encryption involves a DTE-and-then-encrypt process. ...

Similar publications

Article
Full-text available
Image encryption serves as a crucial means to safeguard information against unauthorized access during both transmission and storage phases. This paper introduces an integrated encryption algorithm tailored for multiple images, leveraging a novel hyperchaotic system and the Baker map to augment the key space and enhance security measures. The metho...

Citations

... As a result, any communication must be safeguarded and verified. This criterion can be met using authorized encryption methods [22,206,207,210,236]. (c) Availability Drones should be able to operate uninterrupted, whether deliberately or inadvertently. ...
... With the rise of cyber terrorism, there is a pressing need to learn how to prevent it using modern scientific approaches such as AI [75], and ML algorithms [321]. Using feature selection optimization [2,3], feature extraction [322,325], big data application techniques [210][211][212], mathematical models [203,204], forensic DNA profiling [203,204], and cognitive deception model [207,272] can also help in securing drones against malicious attackers. (viii) Emerging Technologies Recently, emerging technologies such as artificial intelligence (AI), software-defined networking, fog computing, and blockchain technology have been extensively used to protect drones [111,211,270]. ...
Article
Full-text available
This paper presented an exhaustive survey on the security and privacy issues of drones. These security concerns were thoroughly dissected, particularly the aspect of cybersecurity, which was classified into nine levels. These levels include emerging issues, communication-based attacks, sensors, hardware, hardware-based attacks, software attacks, and physical attacks on the drone itself. Furthermore, we discussed the other non-cybersecurity challenges of drones, such as terrorism, mid-air collisions, illegal surveillance, smuggling, electronic snooping, and reconnaissance, alongside proffering possible solutions. Many of the discovered aspects of drone cybersecurity issues were then quantitatively analyzed using a multi-criteria decision-making problem-solving technique. The questionnaire responses from the general public, experts, and stakeholders in the aviation industry were analyzed. The findings revealed variations in cyber-attack techniques such as distributed denial-of-service (DDoS), denial-of-service (DoS), hacking, jamming, spoofing, electronic snooping, eavesdropping, advanced persistent threat (APT), reconnaissance, hijacking, man-in-the-middle attack, and so on. However, the majority of the participants in the survey, which constitute 70%, were unaware of the existing drone cybersecurity challenges. The remaining 30% were aware of the current drone security issues. Meanwhile, both parties are looking for an immediate solution that will fully provide an atmosphere of prospects in the drone industry. Following that, we presented our experience with drone security and privacy, as well as potential future research directions. This paper is unique in that it discusses the various types of drone cyber-attacks and non-cyber-attack scenarios that threaten the socio-economic system, aviation industry, national security, as well as public security and privacy concerns. It also offers solutions to the cyber-attack and non-cyber-attack cases that have been investigated. As a result, the findings of this study could be used to create, develop, and implement more secure cloud systems to safeguard drones from cyber and non-cyber-attacks.
... The development of Internet of Things (IoT) technology has led to self-monitoring data opportunities and the availability of a vast amount of personal data. Therefore, privacy issues concerning IoT technology data 53,54 should be studied further, as should the context of consent. ...
Article
Full-text available
Boosted by the COVID-19 pandemic, as well as the tightened General Data Protection Regulation (GDPR) legislation within the European Union (EU), individuals have become increasingly concerned about privacy. This is also reflected in how willing individuals are to consent to sharing personal data, including their health data. To understand this behaviour better, this study focuses on willingness to consent in relation to genomic data. The study explores how the provision of educational information relates to willingness to consent, as well as differences in privacy concerns, information sensitivity and the perceived trade-off value between individuals willing versus unwilling to consent to sharing their genomic data. Of the respondents, 65% were initially willing to consent, but after educational information 89% were willing to consent and only 11% remained unwilling to consent. Educating individuals about potential health benefits can thus help to correct the beliefs that originally led to the unwillingness to share genomic data.
... Subsequently, the VGG16 network [35] explores the relationship between the depth and performance of convolutional neural networks, which has strong extensibility; the Inception network [36] differs from the previous two networks in that it adds a structure called Inception, the main advantage of which is the reduction of training parameters; the ResNet network [37] introduces residual network structure, and it can realize that the accuracy does not decrease with the network deepening. These classic neural networks and other network structure models continue to emerge, resulting in the application of neural networks in various fields, such as natural language processing [38] and information decryption [39,40], which bring great convenience to human life. ...
Article
Full-text available
Oracle bone inscriptions (OBIs) are ancient Chinese scripts originated in the Shang Dynasty of China, and now less than half of the existing OBIs are well deciphered. To date, interpreting OBIs mainly relies on professional historians using the rules of OBIs evolution, and the remaining part of the oracle’s deciphering work is stuck in a bottleneck period. Here, we systematically analyze the evolution process of oracle characters by using the Siamese network in Few-shot learning (FSL). We first establish a dataset containing Chinese characters which have finished a relatively complete evolution, including images in five periods: oracle bone inscriptions, bronze inscriptions, seal inscriptions, official script, and regular script. Then, we compare the performance of three typical algorithms, VGG16, ResNet, and AlexNet respectively, as the backbone feature extraction network of the Siamese network. The results show that the highest F1 value of 83.3% and the highest recognition accuracy of 82.67% are obtained by the combination of VGG16 and Siamese network. Based on the analysis, the typical structural performance of each period is evaluated and we identified that the optimized Siamese network is feasible to study the evolution of the OBIs. Our findings provide a new approach for oracle’s deciphering further.
... Attackers can conduct continuous online password guessing or cracking based on the prompting message that indicates the attempted password is wrong. If the server/database was compromised or the attacker obtained the encrypted password manager/vault or ciphertext of user information, the offline password guessing or cracking is still possible based on the feature difference between the output of wrong guessing and correct guessing [12]. In general, attackers use weak password dictionary and hash/rainbow tables to conduct the brute-force attacks, yet some special / targeted password dictionary might also be created and employed. ...
... re-register plaintext or cipher infor ← Database attempted password is wrong. If the server/database was compromised or the attacker obtained the ciphertext, the offline password cracking is still possible based on the feature difference between the output of wrong guessing and correct guessing [12]. In addition, due to the difference of process/program branch, the attacker can measure the power/energy trail, and the side channel password brute-force cracking is feasible. ...
... When legitimate users mistakenly type a wrong password in the login interface, they also get the fake plaintexts that look real. This is an open problem of honey encryption (HE) [12]. The deception response to decryption using incorrect key (no matter it is intentionally or unintentionally) is an inherent requirement of HE to achieve security. ...
Preprint
Full-text available
This paper proposes an authentication-simplified and deceptive scheme (SEIGuard) to protect server-side social engineering information (SEI) and other information against brute-force attacks. In SEIGuard, the password check in authentication is omitted and this design is further combined with the SEI encryption design using honey encryption. The login password merely serves as a temporary key to encrypt SEI and there is no password plaintext or ciphertext stored in the database. During the login, the server doesn't check the login passwords, correct passwords decrypt ciphertexts to be correct plaintexts; incorrect passwords decrypt ciphertexts to be phony but plausible-looking plaintexts (sampled from the same distribution). And these two situations share the same undifferentiated backend procedures. This scheme eliminates the anchor that both online and offline brute-force attacks depending on. Furthermore, this paper presents four SEIGuard scheme designs and algorithms for 4 typical social engineering information objects (mobile phone number, identification number, email address, personal name), which represent 4 different types of message space, i.e. 1) limited and uniformly distributed, 2) limited, complex and uniformly distributed, 3) unlimited and uniformly distributed, 4) unlimited and non-uniformly distributed message space. Specially, we propose multiple small mapping files strategies, binary search algorithms, two-part HE (DTE) design and incremental mapping files solutions for the applications of SEIGuard scheme. Finally, this paper develops the SEIGuard system based on the proposed schemes, designs and algorithms. Experiment result shows that the SEIGuard scheme can effectively protect server-side SEI against brute-force attacks, and SEIGuard also has an impressive real-time response performance that is better than conventional PBE server scheme and HE encryption/decryption.
... The main challenge with employing honey encryption is to create contextually and semantically correct decoy messages that fool an attacker [134]. This requires the underlying message to have a uniform distribution that can be mathematically expressed. ...
Article
Full-text available
As the cost of direct-to-consumer genetic testing has decreased, the amount of digital genomic data available globally has exponentially increased. Due to the immutable nature of genomic data, mechanisms must be put in place to prevent it from being compromised and preserve its long-term privacy while still allowing its richness to be used for medical and societal advancements. This report outlines demonstrated attacks against the privacy of genomic data, the consequences of such attacks, and defenses based on emerging technologies that may be employed to prevent or increase the difficulty of these attacks.
... Consequently, it is not too farfetched to envision that an attacker in possession of a stolen encrypted patient record might have the capacity to decode it in a short time. [30][31][32][33] Modern cryptography is constructed on mathematical theory and computer science practice; cryptographic algorithms are formulated around computational hardness hypothesis, making such algorithms hard to break in practice by any adversary. However, the emanation of practical quantum computers poses a consequential threat to cryptographic schemes currently in use. ...
Article
Full-text available
Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy concerns represent one of the major threats facing the electronic health record system. For instance, a cybercriminal may use a brute-force attack to authenticate into a patient’s account to steal the patient’s personal, medical or genetic details. This threat is amplified given that an individual’s genetic content is connected to their family, thus leading to security risks for their family members as well. Several cases of patient’s data theft have been reported where cybercriminals authenticated into the patient’s account, stole the patient’s medical data and assumed the identity of the patients. In some cases, the stolen data were used to access the patient’s accounts on other platforms and in other cases, to make fraudulent health insurance claims. Several measures have been suggested to address the security issues in electronic health record systems. Nevertheless, we emphasize that current measures proffer security in the short-term. This work studies the feasibility of using a decoy-based system named HoneyDetails in the security of the electronic health record system. HoneyDetails will serve fictitious medical data to the adversary during his hacking attempt to steal the patient’s data. However, the adversary will remain oblivious to the deceit due to the realistic structure of the data. Our findings indicate that the proposed system may serve as a potential measure for safeguarding against patient’s information theft.
... It is possible to streamline the process of interviewing experts [21,22] for unified forms of logical models, automate the process of generating knowledge bases [23], and use simple but fairly effective algorithms to derive management decisions. ...
Conference Paper
Full-text available
Expert control systems emulate the decision making ability of a human expert for solving complex problems by reasoning about knowledge. Artificial intelligence techniques are usually used for the purpose of representing knowledge and for generating control decisions through an appropriate reasoning mechanism. In this paper, the generalized form of knowledge representation models in expert control systems is represented. Furthermore, an algorithm for deriving managerial decisions based on the method of resolving is described. Unified control models are proposed that allow one to determine combinations of control operations that can bring the control object to normal if it goes beyond the permissible ranges of several characteristics. It is proved that when assessing the characteristics of the state of the control object in qualitative categories , the task of deriving a managerial decision is reduced to solving a system of linear equations with Boolean variables or combinatorial optimization problems. Algorithms for solving such problems that implement the idea of a directed enumeration of options are indicated.
... It is possible to streamline the process of interviewing experts [21,22] for unified forms of logical models, automate the process of generating knowledge bases [23], and use simple but fairly effective algorithms to derive management decisions. ...
... Contrast to homomorphic MAC scheme, it is a kind of public key authentication method. In fact, their differences are similar to that between symmetric encryption and public key encryption systems [1], [13], [14]. In [10], Kim discussed the incorrectness of another homomorphic MAC scheme with small key size for authentication in network coding. ...
Article
Full-text available
Recently, Esfahani, Mantas, and Rodriguez proposed a homomorphic message authentication code (MAC) scheme for the random linear network coding (RLNC) to resist tag pollution attacks (TPAs), and also presented the security analysis in 6. As Esfahani et al. said, their scheme is based on the null space properties of 9 and the main contribution lies in adding the process of swapping when generating the tags for data packets. However, in this paper, we first point out that Esfahani et al.’s swapping technique is not essential for the TPA security, because the underlying non-swapping homomorphic MAC scheme has been secure against TPA and the process of swapping only improves the TPA security with a non-negligible factor. More importantly, we find that the security proof of Esfahani et al. is incorrect and misguided. In particular, according to Esfahani et al. suggestion, one should enlarge the number of neighbor nodes to reduce the probability of TPA. However, this study suggests contrary proof in Esfahani et al.’s work by presenting the precise proof for the proposed homomorphic MAC scheme.