SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1019
Securing Messages from Brute Force Attack by Combined Approach of
Honey Encryption and Blowfish
Rasmita Sahu1, Mohd. Shajid Ansari2
1MTech Scholar, Department of Computer Science & Engineering, RSR-RCET, Bhilai, Chhattisgarh, India
2Assistant Professor, HOD, Department of Computer Science & Engineering, RSR-RCET, Bhilai, Chhattisgarh, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -Nowadays, Messagingserviceisbeing usedinmany
daily life applications like banking, business processes, mobile
commerce, and so on. Mostly the current messaging based
transactions use traditional encryption for security of the
message. But the message may be hacked easily by the brute
force attacker when he/she guess the key. Encryption also
poses a threat as if key is hacked then the message could be
intercepted during transmission. Theproposedapproachaims
to develop a secure messaging transmission scheme that uses
Honey Encryption technique for preventing the text based
messages from brute face attacks in order to make messaging
communication more secure and efficient. In this research
paper we present a secure framework for messaging in
android based device by using Honey Encryption with an
efficient symmetric keyencryptionalgorithm. Wealsoperform
a comparative analysis between the HoneyEncodingwithAES
and Honey encoding with Blowfish algorithm. Experiments
show that the Honey Encryption produce best result with
Blowfish as compared to AES because Blowfish takes less
processing time.
Keywords-Messaging, Brute forceAttack,HoneyEncryption,
AES, Blowfish
I. INTRODUCTION
The popularity of messaging services is increasing day by
day as it is being used in many data centric applications
including railways enquiry, news alert, mobile banking, and
health care applications.Usersendsconfidential information
using messaging services. The contents of messaging are
stored in messaging centre and it is visible to the network
provider Staff it can modify he contain of the message and
therefore, Messaging is not an appropriate communication
medium for secure communications. A hacker can easily
hack the messaging centre and read the message contain.
People send confidential information through the SMS so
security is needed.
For providing security mostly encryption technique is used
by which the message is converted into an unreadable
format known as cipher text. But still the encryption is
weaker because brute force attacker [2]hack messageeasily
if he find the key through some hacking methods. The
security totally depends upon the key sizeandqualityofkey.
If the key length is n bit then there is a possibility of
generating 2n possible keys [1]. So the attacker needs to try
264 possible operations for cracking 64 bit key.
II. EXISTING SYSTEM
In the existing system the message security is provided by
the conventional cryptographic algorithms like symmetric
key and asymmetric key. The conventional Password Based
Encryption algorithm[1]providesa singlelayersecuritythat
is the message is encrypted by shared secret key at sender
side and produces a cipher text. The cipher text is in
unreadable format and it travels through the network. So in
this case there is a chance of happening Brute force attack
with the cipher text, because the attacker tries to hack the
message by trying all the possibility of keys to decrypt the
message. If he gets the password then he can easily hack the
message. In the reference paper [1] , the authors provides a
best Encryption technique known as Honey Encryption
which provides security against the Brute force attack. The
research paper presents a messaging system for a desktop
based application usingHoneyEncryptionscheme.Weknow
HE is two step approach, so at first step the authors of paper
[1] implement DTE by the Statistical coding scheme and at
step two they propose a symmetric key algorithm AES to
encrypt the encoded message. So we need an improved
framework for Honey encryption for messaging services,
which is proposed in our research work.
III. PROBLEM IDENTIFICATION
The major Issues identified from the traditional approaches
are:
1. The Present AES encryption technique employedin
Honey encryption needs more Processing plus it
demands more rounds of communicating.
2. Present approach is implemented on desktop
computer. Today for messaging people prefer
Android based devices so we need a messaging
application with HE which can execute on Android
based devices
3. DTE is the core of Honey Encryption. So the good
quality of DTE design for messaging application is a
very challenging task because for every plain
message the DTE should generate a meaningful
output message so that the attacker get confuse.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1020
IV. PROPOSED ALGORITHMS
A. Honey Encryption
Honey encryption (HE) is a simple Method of encrypting
messages using Non min-entropy keys for example
passwords. He's intended to produce a cipher text which,
when decrypted with any of a number of keys that were
incorrect, yields plausible appearing but bogus plaintexts
called honey messages. Honey Encryption [2] turns each
wrong password guess made by a hacker to a perplexing
dead-end. When an application or user sends and enters a
password key to get an encrypted database or database, so
long as the password is correct, the data is encrypted and
accessible in its original, and readable, format. In case the
password key is incorrect the data will last to be encrypted
and invisibly. Hackers who steal databasesofuserloginsand
passwords simply need to guess just one correct password
to be able to get access to the data [2]. How that they
understand they have the right password is as soon as the
database or file becomes readable. By way of example, if a
hacker created 100 password attempts, they would get 100
plain text success. Even if one of the passwordswerecorrect,
the real data would be equal from the bogus data.
Honey Encryption is broadly two step process, in first step
DTE (Distribution Transforming Encoding) is happen with
the input data then in second step SE (Symmetric
Encryption) is happen to encrypt the encoded data. The
following diagram shows the overall process of Honey
Encryption Scheme.
Figure-1: Honey Encryption Process
Where the following table present the symbos detail in the
figure1
Table-1: HE Symbols
M Message
S Seed
C Cipher text
K Key
DTEncoder Discrete Transforming Encoder
DTDecoder Discrete Transforming Decoder
B. AES Algorithm
The Popular and widely adopted symmetric encryption
algorithm likely to be encountered nowadays is the
Advanced Encryption Standard (AES). It's found at least six
times faster than algorithms like triple DES. AES comprises
three block ciphers: AES-128, AES-192 and AES-256. Each
cipher encrypts and decrypts data in blocks of128bitsusing
cryptographic keys of 128-, 192- and 256-bits, respectively.
First the plain text block is put into an array then the data is
processed in no of rounds repeatedly to change its original
meaning. The number of rounds is depends upon the key
size. For the key length 128 bit it takes 10 rounds,forthekey
length 192 bit it takes 12 rounds and for key length 256bitit
takes 14 rounds.[10]
C. Blowfish Algorithm
Blowfish is a symmetric block cipher developed by Bruce
Schneier in 1993.It is a fastest algorithm can be Utilized as a
drop-in replacement for DES or IDEA. Blowfish takes 64 bit
input block of message to encrypt and requires a variable-
length key, from 32 bits to 448 bits, which makes it ideal for
both domestic and exportable use [8]. Ever since that time it
has been analyzed considerably, and it's slowly gaining
acceptance as a strong encryption algorithm. Blowfish is
unpatented and license-free, and is available free for all
applications. Blowfish is a Feistel network algorithm
employed (Feistel Network), which consists of 16 rounds
[10]. In this paper we combine this algorithm with Honey
Encoding for the best performance of message security.
V. PROPOSED METHODOLOGY
The methodology will consist of following phases:-
1. At sender side first Encode message with Honey
Encoding and generate encoded text.
2. Encrypt the encoded output with Symmetric key
algorithm and key to generate cipher text.
3. At receiver side decrypt the cipher text with
decryption algorithm and with samekeytoproduce
the encoded text.
4. Then the encoded text is decoded with Honey
Decoding to produce the original message.
5. Then calculate overall processing time
The above 5 steps are perform 2 times. First time with AES
and second time with Blowfish and thencomparetheoverall
processing time in both the cases to find which encryption
algorithm is best with Honey Encoding, whether it is AES or
Blowfish.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1021
5.1 Overall process of proposed algorithm
The following block diagram show the detailed steps of the
proposed messaging systemusingHoneyEncodingwithAES.
Figure -2: Proposed HE with AES
Similar to the above diagram, The following Block diagram
also show the detailed steps of the proposed system using
Honey Encoding with Blowfish algorithm. Here also the
overall processing time for HE _ Encoding, Blowfish _
Encryption, HE _ Decoding and Blowfish _ Decryption is
calculated to compare the time taken by AES with HE.
Figure-3: Proposed HE with Blowfish
In the above two process in figure 1 and figure 2 the
processing time are calculated at each case. We compare the
processing timeconsumed byAESwithHEandBlowfishwith
HE. Here the Blowfish algorithm takes less time as compare
to AES. We implement this in our experiment bellow.
VI. IMPLEMENTATION AND RESULT ANALYSIS
In this section we implement the proposed methodology in
Android studio by developing a simulated messaging
application and the language used is java.
Simulation Environment:
The simulation usesthesuppliedclassesinjava environment
to mimic the operation of AES and Blowfish. The
implementation uses managed wrappers for AES and
Blowfish available in java .cypto and java. Security [Crypto
Spec] that wraps unmanaged Implementations available in
JCE (Java CryptographyExtension)&JCA(Java Cryptography
Architecture).
The Cipher class provide the functionalityofa cryptographic
cipher used for encryption and decryption. It forms the core
of the JCE framework.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1022
Overall Performance with Honey Encryption:
The comparative analysis of working time among the
algorithms with Honey Encryption is as given below.
Figure-4: The Simulated Result in Android Environment
Comparative Analysis of AES and Blowfish with HE
Performance Results using ECB and CBC Mode:
To select any one encryption technique between AES and
Blowfish, which is good for the Honey encoding we have to
compare them according to their performance. The
experiments were conducted using ECB and CBC mode with
AES and Blowfish, the results are shown in figure 1 and
Table 1 below.
Table-2: Performance of AES and Blowfish with modes
Techniques AES
ECB
mode
Blowfish
ECB
mode
AES
CBC
mode
Blowfish
CBC
mode
Time in
Milliseconds
120 10 110 10
Figure-5: Performance graph of AES and Blowfish with
ECB and CBC mode
The result shows the excellence of Blowfish algorithm as
compare to AES in terms of the processing time. It shows
also that AES consumes more processing time with its ECB
and CBC mode than Blowfish. So it is a good decision to
choose Blowfish with Honey Encoding to save time and
provide security.
Table-2: Overall Execution time
Techniques HE with AES HE with
Blowfish
Time taken in
Milliseconds for
a message
250 2
The experiment conducted shows the behavior patterns
according to execution time. The above execution time
reading clearly shows that the proposed approach Honey
Encryption with Blowfish has less execution time as
compared to HE with AES.
Figure-5: Overall Execution Time Chart
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1023
The above line chart show the timetaken byHoneyencoding
with AES and Honey Encoding with Blowfish to encrypt and
decrypt a single message. The HE with AES takes 250
milliseconds, while the HE with Blowfish takes only 2
milliseconds to performEncoding,Encryption,Decoding and
Decryption for a single message.
Figure-6: Messaging Screen
VII. CONCLUSION
The secure framework is successfully designed to provide
security against Brute force attack with Honey encryption.
For android based devices it is essentially needed that the
messages must be send or receive quickly so we need an
encryption algorithm which takes less time and secure to
encrypt as compare to other, so Blowfish encryption
algorithm is the good choice to integrate with Honey
encoding. Because it takes less processing time as compare
to AES. In future more secure framework can be developed
by Incorporating Handshaking techniques for end to end
empowerment between sender and receiver. Also we can
apply the honey encryption with Blowfish in cloud
computing security in future.
REFERENCES
[1] Joo-Im Kim and Ji Won Yoon, “Honey chatting: a
novel instant messaging system Robust to
eavesdropping over communication,” ICASSP,IEEE
2016
[2] Ari Juels, Thomas Ristenpart, “Honey Encryption
Encryption Beyond the Brute-Force Barrier,”
Copublished by the IEEE Computer and Reliability
Societies , 2014
[3] N. Tyagi, J. Wang, K. Wen, and D. Zuo. “Honey
encryption applications.,” Network Security, 2015.
[4] Hoyul Choi, Hyunjae Nam, Junbeom Hur,”Password
Typos Resilience in Honey Encryption,”
International Conference on Information
Networking, IEEE 2017
[5] Amir Emad Ghassami, Daniel Cullina, and Negar
Kiyavash, “Message Partitioning and Limited
Auxiliary Randomness: Alternatives to Honey
Encryption,”IEEE International Symposium on
Information Theory, 2016
[6] Ari Juels, Thomas Ristenpart , “Honey Encryption:
Security Beyond the Brute-Force Bound ,“
EUROCRYPT 2014
[7] Neetesh Saxena ,Narendra S. Chaudhary“EasySMS:
A Protocol For End-to-End Secure Trans-missionOf
SMS” IEEE Transactions OnInformation Forensics
And Security, Vol. 9, No. 7,July 2014
[8] Muhammad Kamran Asif, Yahya Subhi Al-Harthi,
“Intrusion Detection System using Honey Token
based Encrypted Pointers to MitigateCyberThreats
for Critical Infrastructure Networks,” International
Conference on Systems, Man, and Cybernetics,IEEE
2014
[9] Sourabh Chandra, Smita Paira ,” A comparative
survey of symmetric and asymmetric key
cryptography,” International Conference on
Electronics, Communication and Computational
Engineering (ICECCE), IEEE 2014
[10] G. Sowmya, D.Jamuna, M.Venkatakrishna
Reddy, “Blocking of Brute Force Attack”,
International Journal of Engineering Research &
Technology(IJERT), ISSN:2278-0181 Vol. 1 Issue 6,
August-2012
[11] P. Princy “A Comparison Of Symmetric Key
Algorithms DES, AES, BLOWFISH, RC4, RC6: A
Survey” International Journal of Computer Science
& Engineering Technology ISSN : 2229-3345 Vol. 6
No. 05 May 2015
[12] Priyanka Chouhan, Rajendra Singh,”
Security Attacks on Cloud Computing With Possible
Solution”, International Journal of Advanced
Research in Computer Science and Software
Engineering, Volume 6, Issue 1, January 2016
[13] Varsha S.Bari1,Nileema R.Ghuge,ChaitaliC.
Wagh,Sayali R. Sonawane ,Mr.M.B. Gawali“, SMS
Encryption on Android Message Application”,
IJARIIE-ISSN (O)-2395-4396 Vol-2 Issue-2 2016.

More Related Content

What's hot

Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 
Securing Mobile Data using Cryptography
Securing Mobile Data using CryptographySecuring Mobile Data using Cryptography
Securing Mobile Data using CryptographyEswar Publications
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Fego Ogwara
 
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Cryptography On Android Message Application Using Look  Up Table And Dynamic ...Cryptography On Android Message Application Using Look  Up Table And Dynamic ...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...IOSR Journals
 
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsStudy of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsIRJET Journal
 
Unlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased SecurityUnlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased SecurityIJCSEA Journal
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver04
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET Journal
 
Modified honey encryption scheme for encoding natural language message
Modified honey encryption scheme for encoding natural language messageModified honey encryption scheme for encoding natural language message
Modified honey encryption scheme for encoding natural language messageIJECEIAES
 

What's hot (20)

Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Ntewrok secuirty cs1
Ntewrok secuirty cs1Ntewrok secuirty cs1
Ntewrok secuirty cs1
 
Securing Mobile Data using Cryptography
Securing Mobile Data using CryptographySecuring Mobile Data using Cryptography
Securing Mobile Data using Cryptography
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
N45028390
N45028390N45028390
N45028390
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...Securing Database Passwords Using a Combination of hashing and Salting Techni...
Securing Database Passwords Using a Combination of hashing and Salting Techni...
 
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Cryptography On Android Message Application Using Look  Up Table And Dynamic ...Cryptography On Android Message Application Using Look  Up Table And Dynamic ...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
 
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsStudy of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam Emails
 
Unlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased SecurityUnlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased Security
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
 
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
 
Jo3417381741
Jo3417381741Jo3417381741
Jo3417381741
 
Modified honey encryption scheme for encoding natural language message
Modified honey encryption scheme for encoding natural language messageModified honey encryption scheme for encoding natural language message
Modified honey encryption scheme for encoding natural language message
 

Similar to Securing Messages from Brute Force Attack by Combined Approach of Honey Encryption and Blowfish

IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsJoe Osborn
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic TechniquesStacy Taylor
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
 
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET Journal
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEAM Publications,India
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 

Similar to Securing Messages from Brute Force Attack by Combined Approach of Honey Encryption and Blowfish (20)

J017667582
J017667582J017667582
J017667582
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

Securing Messages from Brute Force Attack by Combined Approach of Honey Encryption and Blowfish

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1019 Securing Messages from Brute Force Attack by Combined Approach of Honey Encryption and Blowfish Rasmita Sahu1, Mohd. Shajid Ansari2 1MTech Scholar, Department of Computer Science & Engineering, RSR-RCET, Bhilai, Chhattisgarh, India 2Assistant Professor, HOD, Department of Computer Science & Engineering, RSR-RCET, Bhilai, Chhattisgarh, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -Nowadays, Messagingserviceisbeing usedinmany daily life applications like banking, business processes, mobile commerce, and so on. Mostly the current messaging based transactions use traditional encryption for security of the message. But the message may be hacked easily by the brute force attacker when he/she guess the key. Encryption also poses a threat as if key is hacked then the message could be intercepted during transmission. Theproposedapproachaims to develop a secure messaging transmission scheme that uses Honey Encryption technique for preventing the text based messages from brute face attacks in order to make messaging communication more secure and efficient. In this research paper we present a secure framework for messaging in android based device by using Honey Encryption with an efficient symmetric keyencryptionalgorithm. Wealsoperform a comparative analysis between the HoneyEncodingwithAES and Honey encoding with Blowfish algorithm. Experiments show that the Honey Encryption produce best result with Blowfish as compared to AES because Blowfish takes less processing time. Keywords-Messaging, Brute forceAttack,HoneyEncryption, AES, Blowfish I. INTRODUCTION The popularity of messaging services is increasing day by day as it is being used in many data centric applications including railways enquiry, news alert, mobile banking, and health care applications.Usersendsconfidential information using messaging services. The contents of messaging are stored in messaging centre and it is visible to the network provider Staff it can modify he contain of the message and therefore, Messaging is not an appropriate communication medium for secure communications. A hacker can easily hack the messaging centre and read the message contain. People send confidential information through the SMS so security is needed. For providing security mostly encryption technique is used by which the message is converted into an unreadable format known as cipher text. But still the encryption is weaker because brute force attacker [2]hack messageeasily if he find the key through some hacking methods. The security totally depends upon the key sizeandqualityofkey. If the key length is n bit then there is a possibility of generating 2n possible keys [1]. So the attacker needs to try 264 possible operations for cracking 64 bit key. II. EXISTING SYSTEM In the existing system the message security is provided by the conventional cryptographic algorithms like symmetric key and asymmetric key. The conventional Password Based Encryption algorithm[1]providesa singlelayersecuritythat is the message is encrypted by shared secret key at sender side and produces a cipher text. The cipher text is in unreadable format and it travels through the network. So in this case there is a chance of happening Brute force attack with the cipher text, because the attacker tries to hack the message by trying all the possibility of keys to decrypt the message. If he gets the password then he can easily hack the message. In the reference paper [1] , the authors provides a best Encryption technique known as Honey Encryption which provides security against the Brute force attack. The research paper presents a messaging system for a desktop based application usingHoneyEncryptionscheme.Weknow HE is two step approach, so at first step the authors of paper [1] implement DTE by the Statistical coding scheme and at step two they propose a symmetric key algorithm AES to encrypt the encoded message. So we need an improved framework for Honey encryption for messaging services, which is proposed in our research work. III. PROBLEM IDENTIFICATION The major Issues identified from the traditional approaches are: 1. The Present AES encryption technique employedin Honey encryption needs more Processing plus it demands more rounds of communicating. 2. Present approach is implemented on desktop computer. Today for messaging people prefer Android based devices so we need a messaging application with HE which can execute on Android based devices 3. DTE is the core of Honey Encryption. So the good quality of DTE design for messaging application is a very challenging task because for every plain message the DTE should generate a meaningful output message so that the attacker get confuse.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1020 IV. PROPOSED ALGORITHMS A. Honey Encryption Honey encryption (HE) is a simple Method of encrypting messages using Non min-entropy keys for example passwords. He's intended to produce a cipher text which, when decrypted with any of a number of keys that were incorrect, yields plausible appearing but bogus plaintexts called honey messages. Honey Encryption [2] turns each wrong password guess made by a hacker to a perplexing dead-end. When an application or user sends and enters a password key to get an encrypted database or database, so long as the password is correct, the data is encrypted and accessible in its original, and readable, format. In case the password key is incorrect the data will last to be encrypted and invisibly. Hackers who steal databasesofuserloginsand passwords simply need to guess just one correct password to be able to get access to the data [2]. How that they understand they have the right password is as soon as the database or file becomes readable. By way of example, if a hacker created 100 password attempts, they would get 100 plain text success. Even if one of the passwordswerecorrect, the real data would be equal from the bogus data. Honey Encryption is broadly two step process, in first step DTE (Distribution Transforming Encoding) is happen with the input data then in second step SE (Symmetric Encryption) is happen to encrypt the encoded data. The following diagram shows the overall process of Honey Encryption Scheme. Figure-1: Honey Encryption Process Where the following table present the symbos detail in the figure1 Table-1: HE Symbols M Message S Seed C Cipher text K Key DTEncoder Discrete Transforming Encoder DTDecoder Discrete Transforming Decoder B. AES Algorithm The Popular and widely adopted symmetric encryption algorithm likely to be encountered nowadays is the Advanced Encryption Standard (AES). It's found at least six times faster than algorithms like triple DES. AES comprises three block ciphers: AES-128, AES-192 and AES-256. Each cipher encrypts and decrypts data in blocks of128bitsusing cryptographic keys of 128-, 192- and 256-bits, respectively. First the plain text block is put into an array then the data is processed in no of rounds repeatedly to change its original meaning. The number of rounds is depends upon the key size. For the key length 128 bit it takes 10 rounds,forthekey length 192 bit it takes 12 rounds and for key length 256bitit takes 14 rounds.[10] C. Blowfish Algorithm Blowfish is a symmetric block cipher developed by Bruce Schneier in 1993.It is a fastest algorithm can be Utilized as a drop-in replacement for DES or IDEA. Blowfish takes 64 bit input block of message to encrypt and requires a variable- length key, from 32 bits to 448 bits, which makes it ideal for both domestic and exportable use [8]. Ever since that time it has been analyzed considerably, and it's slowly gaining acceptance as a strong encryption algorithm. Blowfish is unpatented and license-free, and is available free for all applications. Blowfish is a Feistel network algorithm employed (Feistel Network), which consists of 16 rounds [10]. In this paper we combine this algorithm with Honey Encoding for the best performance of message security. V. PROPOSED METHODOLOGY The methodology will consist of following phases:- 1. At sender side first Encode message with Honey Encoding and generate encoded text. 2. Encrypt the encoded output with Symmetric key algorithm and key to generate cipher text. 3. At receiver side decrypt the cipher text with decryption algorithm and with samekeytoproduce the encoded text. 4. Then the encoded text is decoded with Honey Decoding to produce the original message. 5. Then calculate overall processing time The above 5 steps are perform 2 times. First time with AES and second time with Blowfish and thencomparetheoverall processing time in both the cases to find which encryption algorithm is best with Honey Encoding, whether it is AES or Blowfish.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1021 5.1 Overall process of proposed algorithm The following block diagram show the detailed steps of the proposed messaging systemusingHoneyEncodingwithAES. Figure -2: Proposed HE with AES Similar to the above diagram, The following Block diagram also show the detailed steps of the proposed system using Honey Encoding with Blowfish algorithm. Here also the overall processing time for HE _ Encoding, Blowfish _ Encryption, HE _ Decoding and Blowfish _ Decryption is calculated to compare the time taken by AES with HE. Figure-3: Proposed HE with Blowfish In the above two process in figure 1 and figure 2 the processing time are calculated at each case. We compare the processing timeconsumed byAESwithHEandBlowfishwith HE. Here the Blowfish algorithm takes less time as compare to AES. We implement this in our experiment bellow. VI. IMPLEMENTATION AND RESULT ANALYSIS In this section we implement the proposed methodology in Android studio by developing a simulated messaging application and the language used is java. Simulation Environment: The simulation usesthesuppliedclassesinjava environment to mimic the operation of AES and Blowfish. The implementation uses managed wrappers for AES and Blowfish available in java .cypto and java. Security [Crypto Spec] that wraps unmanaged Implementations available in JCE (Java CryptographyExtension)&JCA(Java Cryptography Architecture). The Cipher class provide the functionalityofa cryptographic cipher used for encryption and decryption. It forms the core of the JCE framework.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1022 Overall Performance with Honey Encryption: The comparative analysis of working time among the algorithms with Honey Encryption is as given below. Figure-4: The Simulated Result in Android Environment Comparative Analysis of AES and Blowfish with HE Performance Results using ECB and CBC Mode: To select any one encryption technique between AES and Blowfish, which is good for the Honey encoding we have to compare them according to their performance. The experiments were conducted using ECB and CBC mode with AES and Blowfish, the results are shown in figure 1 and Table 1 below. Table-2: Performance of AES and Blowfish with modes Techniques AES ECB mode Blowfish ECB mode AES CBC mode Blowfish CBC mode Time in Milliseconds 120 10 110 10 Figure-5: Performance graph of AES and Blowfish with ECB and CBC mode The result shows the excellence of Blowfish algorithm as compare to AES in terms of the processing time. It shows also that AES consumes more processing time with its ECB and CBC mode than Blowfish. So it is a good decision to choose Blowfish with Honey Encoding to save time and provide security. Table-2: Overall Execution time Techniques HE with AES HE with Blowfish Time taken in Milliseconds for a message 250 2 The experiment conducted shows the behavior patterns according to execution time. The above execution time reading clearly shows that the proposed approach Honey Encryption with Blowfish has less execution time as compared to HE with AES. Figure-5: Overall Execution Time Chart
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1023 The above line chart show the timetaken byHoneyencoding with AES and Honey Encoding with Blowfish to encrypt and decrypt a single message. The HE with AES takes 250 milliseconds, while the HE with Blowfish takes only 2 milliseconds to performEncoding,Encryption,Decoding and Decryption for a single message. Figure-6: Messaging Screen VII. CONCLUSION The secure framework is successfully designed to provide security against Brute force attack with Honey encryption. For android based devices it is essentially needed that the messages must be send or receive quickly so we need an encryption algorithm which takes less time and secure to encrypt as compare to other, so Blowfish encryption algorithm is the good choice to integrate with Honey encoding. Because it takes less processing time as compare to AES. In future more secure framework can be developed by Incorporating Handshaking techniques for end to end empowerment between sender and receiver. Also we can apply the honey encryption with Blowfish in cloud computing security in future. REFERENCES [1] Joo-Im Kim and Ji Won Yoon, “Honey chatting: a novel instant messaging system Robust to eavesdropping over communication,” ICASSP,IEEE 2016 [2] Ari Juels, Thomas Ristenpart, “Honey Encryption Encryption Beyond the Brute-Force Barrier,” Copublished by the IEEE Computer and Reliability Societies , 2014 [3] N. Tyagi, J. Wang, K. Wen, and D. Zuo. “Honey encryption applications.,” Network Security, 2015. [4] Hoyul Choi, Hyunjae Nam, Junbeom Hur,”Password Typos Resilience in Honey Encryption,” International Conference on Information Networking, IEEE 2017 [5] Amir Emad Ghassami, Daniel Cullina, and Negar Kiyavash, “Message Partitioning and Limited Auxiliary Randomness: Alternatives to Honey Encryption,”IEEE International Symposium on Information Theory, 2016 [6] Ari Juels, Thomas Ristenpart , “Honey Encryption: Security Beyond the Brute-Force Bound ,“ EUROCRYPT 2014 [7] Neetesh Saxena ,Narendra S. Chaudhary“EasySMS: A Protocol For End-to-End Secure Trans-missionOf SMS” IEEE Transactions OnInformation Forensics And Security, Vol. 9, No. 7,July 2014 [8] Muhammad Kamran Asif, Yahya Subhi Al-Harthi, “Intrusion Detection System using Honey Token based Encrypted Pointers to MitigateCyberThreats for Critical Infrastructure Networks,” International Conference on Systems, Man, and Cybernetics,IEEE 2014 [9] Sourabh Chandra, Smita Paira ,” A comparative survey of symmetric and asymmetric key cryptography,” International Conference on Electronics, Communication and Computational Engineering (ICECCE), IEEE 2014 [10] G. Sowmya, D.Jamuna, M.Venkatakrishna Reddy, “Blocking of Brute Force Attack”, International Journal of Engineering Research & Technology(IJERT), ISSN:2278-0181 Vol. 1 Issue 6, August-2012 [11] P. Princy “A Comparison Of Symmetric Key Algorithms DES, AES, BLOWFISH, RC4, RC6: A Survey” International Journal of Computer Science & Engineering Technology ISSN : 2229-3345 Vol. 6 No. 05 May 2015 [12] Priyanka Chouhan, Rajendra Singh,” Security Attacks on Cloud Computing With Possible Solution”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 1, January 2016 [13] Varsha S.Bari1,Nileema R.Ghuge,ChaitaliC. Wagh,Sayali R. Sonawane ,Mr.M.B. Gawali“, SMS Encryption on Android Message Application”, IJARIIE-ISSN (O)-2395-4396 Vol-2 Issue-2 2016.