Submit Search
Upload
Securing Messages from Brute Force Attack by Combined Approach of Honey Encryption and Blowfish
•
1 like
•
71 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i9/IRJET-V4I9179.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
pankaj kumari
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
DES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
Recommended
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
pankaj kumari
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
DES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
Network security unit 1,2,3
Network security unit 1,2,3
WE-IT TUTORIALS
Ntewrok secuirty cs1
Ntewrok secuirty cs1
Infinity Tech Solutions
Securing Mobile Data using Cryptography
Securing Mobile Data using Cryptography
Eswar Publications
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
Mj3422172221
Mj3422172221
IJERA Editor
M dgx mde0mdm=
M dgx mde0mdm=
International Journal of Science and Research (IJSR)
N45028390
N45028390
IJERA Editor
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Fego Ogwara
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
IOSR Journals
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam Emails
IRJET Journal
Unlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased Security
IJCSEA Journal
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
IJASRD Journal
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
Universitas Pembangunan Panca Budi
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
IRJET Journal
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
Skyriver04
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
IRJET Journal
Jo3417381741
Jo3417381741
IJERA Editor
Modified honey encryption scheme for encoding natural language message
Modified honey encryption scheme for encoding natural language message
IJECEIAES
J017667582
J017667582
IOSR Journals
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
More Related Content
What's hot
Network security unit 1,2,3
Network security unit 1,2,3
WE-IT TUTORIALS
Ntewrok secuirty cs1
Ntewrok secuirty cs1
Infinity Tech Solutions
Securing Mobile Data using Cryptography
Securing Mobile Data using Cryptography
Eswar Publications
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
Mj3422172221
Mj3422172221
IJERA Editor
M dgx mde0mdm=
M dgx mde0mdm=
International Journal of Science and Research (IJSR)
N45028390
N45028390
IJERA Editor
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Fego Ogwara
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
IOSR Journals
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam Emails
IRJET Journal
Unlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased Security
IJCSEA Journal
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
IJASRD Journal
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
Universitas Pembangunan Panca Budi
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
IRJET Journal
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
Skyriver04
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
IRJET Journal
Jo3417381741
Jo3417381741
IJERA Editor
Modified honey encryption scheme for encoding natural language message
Modified honey encryption scheme for encoding natural language message
IJECEIAES
What's hot
(20)
Network security unit 1,2,3
Network security unit 1,2,3
Ntewrok secuirty cs1
Ntewrok secuirty cs1
Securing Mobile Data using Cryptography
Securing Mobile Data using Cryptography
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
Mj3422172221
Mj3422172221
M dgx mde0mdm=
M dgx mde0mdm=
N45028390
N45028390
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam Emails
Unlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased Security
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
Jo3417381741
Jo3417381741
Modified honey encryption scheme for encoding natural language message
Modified honey encryption scheme for encoding natural language message
Similar to Securing Messages from Brute Force Attack by Combined Approach of Honey Encryption and Blowfish
J017667582
J017667582
IOSR Journals
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
Joe Osborn
A Study On Cryptographic Techniques
A Study On Cryptographic Techniques
Stacy Taylor
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET Journal
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
International Journal of Science and Research (IJSR)
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
L017136269
L017136269
IOSR Journals
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IOSR Journals
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
AM Publications,India
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
Editor IJCATR
Ijetcas14 355
Ijetcas14 355
Iasir Journals
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
Implement a novel symmetric block
Implement a novel symmetric block
ijcisjournal
Similar to Securing Messages from Brute Force Attack by Combined Approach of Honey Encryption and Blowfish
(20)
J017667582
J017667582
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
A Study On Cryptographic Techniques
A Study On Cryptographic Techniques
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
L017136269
L017136269
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
Ijetcas14 355
Ijetcas14 355
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Implement a novel symmetric block
Implement a novel symmetric block
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
power system scada applications and uses
power system scada applications and uses
DevarapalliHaritha
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Recently uploaded
(20)
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
power system scada applications and uses
power system scada applications and uses
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Securing Messages from Brute Force Attack by Combined Approach of Honey Encryption and Blowfish
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1019 Securing Messages from Brute Force Attack by Combined Approach of Honey Encryption and Blowfish Rasmita Sahu1, Mohd. Shajid Ansari2 1MTech Scholar, Department of Computer Science & Engineering, RSR-RCET, Bhilai, Chhattisgarh, India 2Assistant Professor, HOD, Department of Computer Science & Engineering, RSR-RCET, Bhilai, Chhattisgarh, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -Nowadays, Messagingserviceisbeing usedinmany daily life applications like banking, business processes, mobile commerce, and so on. Mostly the current messaging based transactions use traditional encryption for security of the message. But the message may be hacked easily by the brute force attacker when he/she guess the key. Encryption also poses a threat as if key is hacked then the message could be intercepted during transmission. Theproposedapproachaims to develop a secure messaging transmission scheme that uses Honey Encryption technique for preventing the text based messages from brute face attacks in order to make messaging communication more secure and efficient. In this research paper we present a secure framework for messaging in android based device by using Honey Encryption with an efficient symmetric keyencryptionalgorithm. Wealsoperform a comparative analysis between the HoneyEncodingwithAES and Honey encoding with Blowfish algorithm. Experiments show that the Honey Encryption produce best result with Blowfish as compared to AES because Blowfish takes less processing time. Keywords-Messaging, Brute forceAttack,HoneyEncryption, AES, Blowfish I. INTRODUCTION The popularity of messaging services is increasing day by day as it is being used in many data centric applications including railways enquiry, news alert, mobile banking, and health care applications.Usersendsconfidential information using messaging services. The contents of messaging are stored in messaging centre and it is visible to the network provider Staff it can modify he contain of the message and therefore, Messaging is not an appropriate communication medium for secure communications. A hacker can easily hack the messaging centre and read the message contain. People send confidential information through the SMS so security is needed. For providing security mostly encryption technique is used by which the message is converted into an unreadable format known as cipher text. But still the encryption is weaker because brute force attacker [2]hack messageeasily if he find the key through some hacking methods. The security totally depends upon the key sizeandqualityofkey. If the key length is n bit then there is a possibility of generating 2n possible keys [1]. So the attacker needs to try 264 possible operations for cracking 64 bit key. II. EXISTING SYSTEM In the existing system the message security is provided by the conventional cryptographic algorithms like symmetric key and asymmetric key. The conventional Password Based Encryption algorithm[1]providesa singlelayersecuritythat is the message is encrypted by shared secret key at sender side and produces a cipher text. The cipher text is in unreadable format and it travels through the network. So in this case there is a chance of happening Brute force attack with the cipher text, because the attacker tries to hack the message by trying all the possibility of keys to decrypt the message. If he gets the password then he can easily hack the message. In the reference paper [1] , the authors provides a best Encryption technique known as Honey Encryption which provides security against the Brute force attack. The research paper presents a messaging system for a desktop based application usingHoneyEncryptionscheme.Weknow HE is two step approach, so at first step the authors of paper [1] implement DTE by the Statistical coding scheme and at step two they propose a symmetric key algorithm AES to encrypt the encoded message. So we need an improved framework for Honey encryption for messaging services, which is proposed in our research work. III. PROBLEM IDENTIFICATION The major Issues identified from the traditional approaches are: 1. The Present AES encryption technique employedin Honey encryption needs more Processing plus it demands more rounds of communicating. 2. Present approach is implemented on desktop computer. Today for messaging people prefer Android based devices so we need a messaging application with HE which can execute on Android based devices 3. DTE is the core of Honey Encryption. So the good quality of DTE design for messaging application is a very challenging task because for every plain message the DTE should generate a meaningful output message so that the attacker get confuse.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1020 IV. PROPOSED ALGORITHMS A. Honey Encryption Honey encryption (HE) is a simple Method of encrypting messages using Non min-entropy keys for example passwords. He's intended to produce a cipher text which, when decrypted with any of a number of keys that were incorrect, yields plausible appearing but bogus plaintexts called honey messages. Honey Encryption [2] turns each wrong password guess made by a hacker to a perplexing dead-end. When an application or user sends and enters a password key to get an encrypted database or database, so long as the password is correct, the data is encrypted and accessible in its original, and readable, format. In case the password key is incorrect the data will last to be encrypted and invisibly. Hackers who steal databasesofuserloginsand passwords simply need to guess just one correct password to be able to get access to the data [2]. How that they understand they have the right password is as soon as the database or file becomes readable. By way of example, if a hacker created 100 password attempts, they would get 100 plain text success. Even if one of the passwordswerecorrect, the real data would be equal from the bogus data. Honey Encryption is broadly two step process, in first step DTE (Distribution Transforming Encoding) is happen with the input data then in second step SE (Symmetric Encryption) is happen to encrypt the encoded data. The following diagram shows the overall process of Honey Encryption Scheme. Figure-1: Honey Encryption Process Where the following table present the symbos detail in the figure1 Table-1: HE Symbols M Message S Seed C Cipher text K Key DTEncoder Discrete Transforming Encoder DTDecoder Discrete Transforming Decoder B. AES Algorithm The Popular and widely adopted symmetric encryption algorithm likely to be encountered nowadays is the Advanced Encryption Standard (AES). It's found at least six times faster than algorithms like triple DES. AES comprises three block ciphers: AES-128, AES-192 and AES-256. Each cipher encrypts and decrypts data in blocks of128bitsusing cryptographic keys of 128-, 192- and 256-bits, respectively. First the plain text block is put into an array then the data is processed in no of rounds repeatedly to change its original meaning. The number of rounds is depends upon the key size. For the key length 128 bit it takes 10 rounds,forthekey length 192 bit it takes 12 rounds and for key length 256bitit takes 14 rounds.[10] C. Blowfish Algorithm Blowfish is a symmetric block cipher developed by Bruce Schneier in 1993.It is a fastest algorithm can be Utilized as a drop-in replacement for DES or IDEA. Blowfish takes 64 bit input block of message to encrypt and requires a variable- length key, from 32 bits to 448 bits, which makes it ideal for both domestic and exportable use [8]. Ever since that time it has been analyzed considerably, and it's slowly gaining acceptance as a strong encryption algorithm. Blowfish is unpatented and license-free, and is available free for all applications. Blowfish is a Feistel network algorithm employed (Feistel Network), which consists of 16 rounds [10]. In this paper we combine this algorithm with Honey Encoding for the best performance of message security. V. PROPOSED METHODOLOGY The methodology will consist of following phases:- 1. At sender side first Encode message with Honey Encoding and generate encoded text. 2. Encrypt the encoded output with Symmetric key algorithm and key to generate cipher text. 3. At receiver side decrypt the cipher text with decryption algorithm and with samekeytoproduce the encoded text. 4. Then the encoded text is decoded with Honey Decoding to produce the original message. 5. Then calculate overall processing time The above 5 steps are perform 2 times. First time with AES and second time with Blowfish and thencomparetheoverall processing time in both the cases to find which encryption algorithm is best with Honey Encoding, whether it is AES or Blowfish.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1021 5.1 Overall process of proposed algorithm The following block diagram show the detailed steps of the proposed messaging systemusingHoneyEncodingwithAES. Figure -2: Proposed HE with AES Similar to the above diagram, The following Block diagram also show the detailed steps of the proposed system using Honey Encoding with Blowfish algorithm. Here also the overall processing time for HE _ Encoding, Blowfish _ Encryption, HE _ Decoding and Blowfish _ Decryption is calculated to compare the time taken by AES with HE. Figure-3: Proposed HE with Blowfish In the above two process in figure 1 and figure 2 the processing time are calculated at each case. We compare the processing timeconsumed byAESwithHEandBlowfishwith HE. Here the Blowfish algorithm takes less time as compare to AES. We implement this in our experiment bellow. VI. IMPLEMENTATION AND RESULT ANALYSIS In this section we implement the proposed methodology in Android studio by developing a simulated messaging application and the language used is java. Simulation Environment: The simulation usesthesuppliedclassesinjava environment to mimic the operation of AES and Blowfish. The implementation uses managed wrappers for AES and Blowfish available in java .cypto and java. Security [Crypto Spec] that wraps unmanaged Implementations available in JCE (Java CryptographyExtension)&JCA(Java Cryptography Architecture). The Cipher class provide the functionalityofa cryptographic cipher used for encryption and decryption. It forms the core of the JCE framework.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1022 Overall Performance with Honey Encryption: The comparative analysis of working time among the algorithms with Honey Encryption is as given below. Figure-4: The Simulated Result in Android Environment Comparative Analysis of AES and Blowfish with HE Performance Results using ECB and CBC Mode: To select any one encryption technique between AES and Blowfish, which is good for the Honey encoding we have to compare them according to their performance. The experiments were conducted using ECB and CBC mode with AES and Blowfish, the results are shown in figure 1 and Table 1 below. Table-2: Performance of AES and Blowfish with modes Techniques AES ECB mode Blowfish ECB mode AES CBC mode Blowfish CBC mode Time in Milliseconds 120 10 110 10 Figure-5: Performance graph of AES and Blowfish with ECB and CBC mode The result shows the excellence of Blowfish algorithm as compare to AES in terms of the processing time. It shows also that AES consumes more processing time with its ECB and CBC mode than Blowfish. So it is a good decision to choose Blowfish with Honey Encoding to save time and provide security. Table-2: Overall Execution time Techniques HE with AES HE with Blowfish Time taken in Milliseconds for a message 250 2 The experiment conducted shows the behavior patterns according to execution time. The above execution time reading clearly shows that the proposed approach Honey Encryption with Blowfish has less execution time as compared to HE with AES. Figure-5: Overall Execution Time Chart
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1023 The above line chart show the timetaken byHoneyencoding with AES and Honey Encoding with Blowfish to encrypt and decrypt a single message. The HE with AES takes 250 milliseconds, while the HE with Blowfish takes only 2 milliseconds to performEncoding,Encryption,Decoding and Decryption for a single message. Figure-6: Messaging Screen VII. CONCLUSION The secure framework is successfully designed to provide security against Brute force attack with Honey encryption. For android based devices it is essentially needed that the messages must be send or receive quickly so we need an encryption algorithm which takes less time and secure to encrypt as compare to other, so Blowfish encryption algorithm is the good choice to integrate with Honey encoding. Because it takes less processing time as compare to AES. In future more secure framework can be developed by Incorporating Handshaking techniques for end to end empowerment between sender and receiver. Also we can apply the honey encryption with Blowfish in cloud computing security in future. REFERENCES [1] Joo-Im Kim and Ji Won Yoon, “Honey chatting: a novel instant messaging system Robust to eavesdropping over communication,” ICASSP,IEEE 2016 [2] Ari Juels, Thomas Ristenpart, “Honey Encryption Encryption Beyond the Brute-Force Barrier,” Copublished by the IEEE Computer and Reliability Societies , 2014 [3] N. Tyagi, J. Wang, K. Wen, and D. Zuo. “Honey encryption applications.,” Network Security, 2015. [4] Hoyul Choi, Hyunjae Nam, Junbeom Hur,”Password Typos Resilience in Honey Encryption,” International Conference on Information Networking, IEEE 2017 [5] Amir Emad Ghassami, Daniel Cullina, and Negar Kiyavash, “Message Partitioning and Limited Auxiliary Randomness: Alternatives to Honey Encryption,”IEEE International Symposium on Information Theory, 2016 [6] Ari Juels, Thomas Ristenpart , “Honey Encryption: Security Beyond the Brute-Force Bound ,“ EUROCRYPT 2014 [7] Neetesh Saxena ,Narendra S. Chaudhary“EasySMS: A Protocol For End-to-End Secure Trans-missionOf SMS” IEEE Transactions OnInformation Forensics And Security, Vol. 9, No. 7,July 2014 [8] Muhammad Kamran Asif, Yahya Subhi Al-Harthi, “Intrusion Detection System using Honey Token based Encrypted Pointers to MitigateCyberThreats for Critical Infrastructure Networks,” International Conference on Systems, Man, and Cybernetics,IEEE 2014 [9] Sourabh Chandra, Smita Paira ,” A comparative survey of symmetric and asymmetric key cryptography,” International Conference on Electronics, Communication and Computational Engineering (ICECCE), IEEE 2014 [10] G. Sowmya, D.Jamuna, M.Venkatakrishna Reddy, “Blocking of Brute Force Attack”, International Journal of Engineering Research & Technology(IJERT), ISSN:2278-0181 Vol. 1 Issue 6, August-2012 [11] P. Princy “A Comparison Of Symmetric Key Algorithms DES, AES, BLOWFISH, RC4, RC6: A Survey” International Journal of Computer Science & Engineering Technology ISSN : 2229-3345 Vol. 6 No. 05 May 2015 [12] Priyanka Chouhan, Rajendra Singh,” Security Attacks on Cloud Computing With Possible Solution”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 1, January 2016 [13] Varsha S.Bari1,Nileema R.Ghuge,ChaitaliC. Wagh,Sayali R. Sonawane ,Mr.M.B. Gawali“, SMS Encryption on Android Message Application”, IJARIIE-ISSN (O)-2395-4396 Vol-2 Issue-2 2016.
Download now