SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 9, No. 3, June 2019, pp. 1871~1878
ISSN: 2088-8708, DOI: 10.11591/ijece.v9i3.pp1871-1878  1871
Journal homepage: http://iaescore.com/journals/index.php/IJECE
Modified honey encryption scheme for encoding natural
language message
Abiodun Esther Omolara, Aman Jantan
School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia
Article Info ABSTRACT
Article history:
Received May 24, 2018
Revised Nov 27, 2018
Accepted Dec 22, 2018
Conventional encryption schemes are susceptible to brute-force attacks. This
is because bytes encode utf8 (or ASCII) characters. Consequently, an
adversary that intercepts a ciphertext and tries to decrypt the message by
brute-forcing with an incorrect key can filter out some of the combinations of
the decrypted message by observing that some of the sequences are a
combination of characters which are distributed non-uniformly and form no
plausible meaning. Honey encryption (HE) scheme was proposed to curtail
this vulnerability of conventional encryption by producing ciphertexts
yielding valid-looking, uniformly distributed but fake plaintexts upon
decryption with incorrect keys. However, the scheme works for only
passwords and PINS. Its adaptation to support encoding natural language
messages (e-mails, human-generated documents) has remained an open
problem. Existing proposals to extend the scheme to support encoding
natural language messages reveals fragments of the plaintext in the
ciphertext, hence, its susceptibility to chosen ciphertext attacks (CCA). In
this paper, we modify the HE schemes to support the encoding of natural
language messages using Natural Language Processing techniques. Our main
contribution was creating a structure that allowed a message to be encoded
entirely in binary. As a result of this strategy, most binary string produces
syntactically correct messages which will be generated to deceive an attacker
who attempts to decrypt a ciphertext using incorrect keys. We evaluate the
security of our proposed scheme.
Keywords:
Adversary
Attacker
Brute-force
Ciphertext
Honey encryption
Plaintext
Copyright © 2019 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Aman Jantan,
Security and Forensic Research Group (SFRG) Laboratory,
School of Computer Sciences,
Universiti Sains Malaysia, Malaysia.
Email : styleest2011@gmail.com
1. INTRODUCTION
Cryptography lies at the heart of a multitude of processes that incorporate E-Commerce,
Internet Banking, Business and Social Networks, Smart Systems and so forth in our information-aware
society [1], [2]. The evolution of the digital world has affected the way in which people manage finances,
procure goods and access healthcare. People have become increasingly reliant on leveraging technology to
enjoy instant access to information, business collaboration, family and friends [3], [4]. This trend of societal
dependence on modern infrastructure has created an avenue for constant security threats and risk.
This challenge has been demonstrated by incessant attacks on computer networks, credit card fraud, malware
attacks, cell phones hack et cetera [5], [6]. To reinforce our computerized-reliant society for the present and
future generation, and leverage on the opportunities that these technologies proffer, there is a pressing need
for reliable information infrastructure with strong security requirements. An essential building block to
achieve information security is cryptography [7], [8].
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1871 - 1878
1872
Cryptography is the study of the science and art of concealing information to prevent a distrusted
party from learning the content of the message [9]. State-of-the-art conventional cryptographic schemes are
prone to brute-force attack. A brute force attack is a trial and error approach used by an adversary to decrypt
a ciphertext, for instance, an attempt to crack a user’s password. The conventional encryption schemes make
it easy for an adversary to continue to employ this method and achieve success. In hindsight, all conventional
encryption schemes are encoded in utf8 (or ASCII) characters. Consequently, an adversary that intercepts a
ciphertext and tries to decrypt the message using a wrong key can filter out some of the combinations of the
decrypted message by observing that some of the sequences are a combination of characters from different
languages and also symbols which are non-uniformly distributed [10], [11]. It is safe to conclude that an
adversary can judge if his attack is successful based on the structure/distribution of the message he recovers
during his attacks [12], [13]. A non-uniform distribution, which forms no plausible meaning signifies an
incorrect plaintext and key. Moreover, the advent of high-processing tools such as FPGA, GPU also makes
the brute-force attack to be highly successful [14], [15], [16]. Therefore, an attacker that intercepts an
encrypted message has a high chance of recovering the key and subsequently the message encrypted under
such key by using the distinguisher technique – which is to judge the decryption output based on the
distribution/structure of the message.
Security experts and the cryptographic community have proposed several countermeasures to
mitigate the brute-force attack on conventional encryption schemes by increasing the length of the key,
computational complexity. Nevertheless, all these methods fail to address the underlying problem, which is
using the distinguisher technique to inform the output of the decryption. An attacker can continue to make
repeat decryptions on an oracle by trying random keys until he finds a plausible message [17-18].
A breakthrough was made in the year 2014 when Juels and Ristenpart [19-20] proposed the Honey
Encryption (HE) scheme in a conference, Eurocrypt 2014. Honey encryption is a paradigm that provides and
improves security beyond the conventional brute-force bounds. It provides a plausible, valid-looking but fake
message when an incorrect key is used for decrypting a ciphertext. It does not yield under a brute-force attack
and it was proposed for passwords and PINs and have been implemented in this regard successfully [19-20].
However, HE has not been applied for the security of natural language messages such as emails,
human-generated documents and certain formats of message. The applications of the standard HE proposed
by [19-20] are precisely for passwords to protect passwords or low min-entropy keys to protect high
min-entropy keys. Indeed, the authors of HE left as an open challenge, its adaptation to natural language
message when they made this statement,
“...for human-generated messages (password vaults, e-mail, etc.) (...) is interesting as a natural
language processing problem.” [19], [20].
While some research efforts have been made towards adapting the scheme to encode
human-generated message, the current proposals are all susceptible to a Chosen-Ciphertext Attack (CCA).
A CCA is an attack model for cryptanalysis in which the adversary collects information, at least in part,
by selecting a ciphertext and decrypting it by trying random keys. This attack is inevitable when parts or
fragments of the plaintext message is revealed in the decrypted message. A practical attacker can easily use
the revealed parts of the message to form other parts of the message and recover the plaintext and the key.
Moreover, some of the proposed approaches do not scale well; they fail to model human language when used
to encode human-generated documents, thus, failing to convince the attacker that he has the target message.
This paper seeks to address the shortfalls of the standard Honey encryption scheme and proposals made by
the notable research efforts in this domain. The principal objective is to extend the HE schemes to adapt it for
encoding natural language message. Our approach also addresses the CCA attacks which current approach
fail to curtail. We employed Natural language processing tools and techniques to build convincing decoy
message which will be served to an attacker that tries to decrypt a ciphertext using incorrect keys.
This strategy will ultimately allow encryption of other formats specifically human-generated messages,
such as emails, written documents, etc. Figure 1 presents how the conventional encryption scheme works
during a brute-force attack. In summary, the contributions of this research include the following:
a. Creating a structure that allows a message to be encoded entirely in binary. As a result of the encoding
strategy, most binary strings produce a syntactically correct message which is capable of fooling an
adversary in search of the plaintext and key.
b. The proposed scheme address CCA attack by generating a message structure that does not reveal any part
of the plaintext in the decoy message and failed decryption (incorrect key) produces radically different
messages from the plaintext.
c. Length of plaintext is concealed by appending a random binary string to the ciphertext since the decoder
runs until the sentence is parsed and then stops. This way the attacker is unable to determine the length of
the plaintext.
Int J Elec & Comp Eng ISSN: 2088-8708 
Modified honey encryption scheme for encoding natural language message (Abiodun Esther Omolara)
1873
d. First successful implementation of a provable secured natural-language-based honey encryption scheme
and its adaptation to natural language messages.
Figure 1. Brute-force attack on current conventional encryption method on a password vault
An attacker that intercepts a plaintext and submits random passwords get non-uniformly distributed
characters as long as he supplies an incorrect key. This is a clear distinguisher that he has not achieved the
plaintext. He continues to try random keys until he gets a valid-looking message. As soon as he gets
plausible, uniformly distributed characters, then he is sure he has achieved the message and the key.
For example, in Figure 1, when the attacker gets ‘123456’, he knows that he has achieved the key. He is
certain he has the correct key because ‘123456’ is distributed evenly and this is made worst as users tend to
use simple, easy-to-guess passwords. Also, the attackers are aware of how users choose weak passwords
(based on the past release of compromised passwords).
2. HONEY ENCRYPTION
The intuition of Honey encryption was borne by Juels and Ristenpart [19-20] after observing the
high rate of password been compromised. For instance, using conventional encryption scheme, if plaintext,
P is a 16-digit Master card number encoded via ASCII and the conventional password-based encryption
scheme is used as cipher, the probability that any Pi≠P is a valid ASCII encoding of a 16-digit string which is
negligible, at t (10/256)16
< 2 −74
. Hence, an adversary can reject incorrect messages and recover P with a
high probability [19-20].
Honey encryption provides security beyond the brute-force barrier by producing ciphertexts which,
upon decryption with incorrect keys, yields plausible-looking plaintexts. The strategy here is to confound the
life of the adversary by making message recovery even after trying every candidate keys to be impossible.
The central component of HE is called a distribution transforming encoder (DTE). This component is
constructed with an estimate of the message distribution pm. Encoding a message sampled from pm should
produce a “seed” value which is uniformly distributed. The DTE is a pair of encoding and
decoding algorithm.
The encoding algorithm is randomized, it takes as input a message M ∈ M and outputs a value in a
set S. Also, the decoding algorithm is deterministic and takes as input a value S ∈ S and outputs a message M
∈ M. When the seed is supplied, a DTE must decode correctly to the plaintext but for every incorrect key,
it should decode to a plausible message sampled from the message distribution. A DTE scheme is correct
if for any M ∈ M, Pr[decode(encode(M)) = M] = 1 [19-20].
The HE scheme consists of two steps usually referred to as DTE-then Encrypt. In the first step,
the DTE is applied to the Message, M to obtain a Seed S. In the second step, the seed S is encrypted under a
conventional encryption scheme using the key K, yielding an HE ciphertext C. The steps are as follows:
a. The encoding process, where the Distribution Transforming Encoder (DTE) is applied to the plaintext
followed by a conventional encryption scheme.
b. The decoding process, where the Distribution Transforming Decoder (DTD) is applied to the ciphertext
followed by a conventional encryption scheme.
The HE algorithm showing the encode and decode process is presented in Figure 2.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1871 - 1878
1874
Honey Encryption Algorithm:
HEnc (K, M)
S ¬$ encode(M)
R ¬$ {0, 1}n
S’ ¬ H (R, K)
C ¬ S’⊕ S
return (R, C)
Honey Decryption Algorithm:
HDec (K, (R, C))
S’¬ H (R, K)
S ¬ C ⊕ S’
M ¬ decode(S)
return M
Figure 2. Honey encoding and decoding algorithms
H represents the cryptographic hash function, K represents a key, M represents the message,
S represents the seed, R represents a random string, C represents the ciphertext, and ¬$ represents uniform
random assignment.
3. PROPOSED APPROACH
Our approach leverages the power of deception to persuade and confuse the attacker that he has the
original message. The experiment of this research are implemented with Python 3.63 and Natural Language
Processing (NLP) libraries. The NLP tools capture the relationship between words and how they combine to
form meaningful sentences. Readers interested in detail treatment of NLP should see [21]-[22]. The decoy
message will have a completely different message structure from the original message (plaintext) but will
have a semantic and contextual meaning. Each message to be encoded is treated as a string of sentence and
processed as a grammatical feature in the English Language. Each word is classified based on the part of
speech by its syntactic functions. In the English Language, the main parts of speech are noun, pronoun, verb,
adverb, adjective, preposition, interjection, conjunction and determiner. Figure 3 shows how nouns are
processed and encrypted, and Figure 4 shows a flowchart of the complete system of our proposed scheme.
Figure 5 shows how nouns are processed and decrypted and Figure 6 shows a flowchart of the complete
system of our proposed scheme. In summary, we create a structure that allowed a sentence to be encoded
completely in binary. As a result of the encoding strategy, most binary strings produce a syntactically
correct sentence.
Algorithm 1: Noun Encoding
1: Get synsets for the noun
if personal noun
Drop synsets with non-personal meaning for the noun (i.e., using mum to refer to a flower)
Else
Drop synsets with personal meaning for the noun (i.e., using a dog to refer to a person)
if synset list is non-empty
Randomly select synset from list
Else
if the noun is a pronoun
Set offset to the length of the list of nouns in wordnet plus one and encode in binary
Encode pronoun
Else
Set offset to the length of the list of nouns in wordnet plus two and encode in binary
Encode unknown word
return binary string
2: Get the path from the root of wordnet noun tree to selected synset
if personal noun
Drop nodes in the path that are parents to "person noun" synset
Else
Drop nodes in the path until "person noun" synset is not in the path
Randomly select a node in the remaining path to be subtree root
Encode offset of the selected node in the list of wordnet's nouns in binary
while not at the desired node (noun passed in)
Append 1 to binary encoding to indicate that search is not complete
Find the index of next node in the path in the list of current root's children
Encode index in binary and append to a string
Append 0 to binary encoding to indicate that search is complete
Find index in the list of synset's lemmas of lemma containing the desired noun
Encode index in binary and append to a string
3: return binary string
Figure 3. Pseudocode for implementing Encrypt Algorithm of the Proposed (Modified) Honey Encryption
Int J Elec & Comp Eng ISSN: 2088-8708 
Modified honey encryption scheme for encoding natural language message (Abiodun Esther Omolara)
1875
Figure 4. Proposed encoding algorithm
Algorithm 2: Noun Decoding
1: Extract offset from binary string
if pronoun
return decoding of the pronoun
if unknown word
return decoding of the unknown word
2: Get synset of a noun at given offset in the list of wordnet's nouns and set as root
while not at the desired node (the first character in the binary string is non-zero)
Extract offset from binary string
Set child at offset in the list of root's children to new root
3: Extract lemma number from a binary string
4: Get specified lemma
5: return the name of the lemma (desired noun)
Figure 5. Pseudocode for implementing decrypt algorithm of the proposed (modified) honey encryption
Figure 6. Proposed decoding algorithm
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1871 - 1878
1876
Note that:
Nouns in Wordnet are organized using a tree structure with general concepts at the root, moving to specific
nodes at the leaves. We utilize this structure for encoding of all nouns within the encoding algorithm.
Verb lemmas in Wordnet are stored with lists of verb frames. These are the possible structures of sentences
using that verb. For example, "Somebody appears" is a valid sentence structure but "Somebody appears
something" is not.
Pronoun encoding/decoding: Have a list of pronouns, encoded as an offset in the list.
Unknown encoding/decoding: Each letter encoded as a position in the alphabet (0-25)
Article encoding/decoding: 0/1 for not exists/exists, then 1/0 if the/a
Conjunction encoding/decoding: Have a list of conjunctions, encoded as an offset in the list.
A general use case of the proposed algorithm is to combine it with any conventional cipher.
For instance, the sender will encrypt this binary string with a cipher (AES, RC4, Twofish, etc.). A wrong key
will produce an incorrectly encoded string which should decode to a semantically correct message.
Only when the correct key is applied should the plaintext decode correctly. Any incorrect key (flipping a bit)
will decode correctly to a valid message with completely different length and structure from the plaintext.
Our approach is completely different from existing approach because no part of the plaintext will be revealed
during decryption with incorrect key. This approach makes it impossible for the adversary to carry out a
chosen ciphertext attack.
We consider a case where an email is to be encoded using our approach. For instance, each email
usually starts with some greeting and will usually end with a goodbye message. An adversary expecting an
email who gets instead a text not starting from this type of greetings will quickly discard the message. In this
case, we define encryption protocol differently. We assume that email-message should always start from the
greeting and first few bits will encode one of the possible greeting’s variations. This way it is not possible for
any encryption key to get the results without greetings and goodbye. Therefore, the higher probability of the
decoy message is done by restricting potential user format of the message.
An easy implementation will be to define three parts of the message which are allowed.
For instance, 1) Greetings with one of the following options: 00 - "Hello", 01 - "Hi", 10 - "Greetings",
11 - "Good time of day"; 2) middle sentence with the following options: 00 - "how are you? "; 01-"Fine";
10-"having a hard day"; 11 - "let's meet"; 3) Good byes: 00 - "Bye"; 10 - "Looking forward"; 01 - "have a
nice day"; 11-"Best wishes” This protocol will limit amount communication very much, but every
combination or key can lead to a meaningful message. There is no way for the attacker to guess if his key
was incorrect.
4. RESULTS AND ANALYSIS
To evaluate our proposed system, we test with a controlled amount of noise added to a ciphertext
(i.e., 1% wrong, 5% wrong, etc.) and compare the sanity of resulting messages.
Word Count: The number of words encoded
Noise Added: Percentage of random bits flipped (incorrect key)
Change in the Word Count: When the adversary tries to decrypt with the key, how many sane words
were generated.
Pimportant: How many important words from the underlying plaintext appear in the decrypted message
when the adversary tries incorrect keys. We define Pimportant as very important keywords in the plaintext
(nouns, pronoun, verb, adverb, adjective) which must not appear in the event of decryption with wrong keys.
Pregular: How many regular words from the underlying plaintext appear in the decrypted message
when the adversary tries incorrect keys. We define Pregular as common words in the plaintext (determiner,
conjunction, interjection, preposition). This is essential because regular words help form a sentence and they
appear in every message and cannot be used to recover the plaintext. For example, a, the, of, on etc are
essential to form sentence. Time-taken: The time it takes to decrypt using our proposed method. Performance
of the proposed modified honey encryption scheme as shown in Table 1.
Int J Elec & Comp Eng ISSN: 2088-8708 
Modified honey encryption scheme for encoding natural language message (Abiodun Esther Omolara)
1877
Table 1. Performance of the Proposed Modified Honey Encryption Scheme
Word Count Noise Added (%)
(brute-forcing with
incorrect keys)
Change in the word
and word count during
decryption
Check if CCA is possible (Any
revealed word from the plaintext in
the decrypted ciphertext?) Pimportant
Pregular Time-taken to
decrypt (ms)
4 4 53 0 0 1.90
7 2 59 0 4 2.23
10 3 54 0 5 3.12
15 2 62 0 4 3.23
20 3 71 0 7 4.40
25 4 88 0 6 4.89
28 5 97 0 9 7.10
38 1 105 0 6 9.30
43 8 127 0 8 10.11
48 7 156 0 9 13.21
82 5 304 0 12 31.11
5. DISCUSSION
The proposed modified honey encryption scheme employs a novel approach for adapting the honey
encryption scheme to support the successful encoding of human-generated message which has been an open
problem since the scheme was proposed [19,20]. This novel invention brings new benefits as well as
some limitations.
In summary, we were able to create a structure where messages are encoded in binary such that
message recovery becomes impossible for an adversary that intercepts a ciphertext and tries to decrypt it
using random keys. The standard HE scheme was designed and provides provable security only in the
context of Passwords, Pins and RSA Keys. Research efforts over the years to extend it for encoding larger
domains (such as human-generated message) has failed to produce convincing decoy message, do not scale
well. Worst is they reveal structural information of the underlying plaintext, thus, the vulnerability to chosen
ciphertext attack (CCA) which makes the probability of message recovery high. Our proposed approach is
the first successful implementation of adapting the honey encryption scheme for supporting encoding of
human-generated message. It produces a plausible message that is good enough to deceive the adversary.
More importantly, the critical message (keywords) that the sender might want to protect is completely
concealed and cannot appear during decryption with incorrect keys, thereby, countering the CCA. However,
we must state that our approach impacts time when the message gets larger. For this limitation, we are
thinking of other ways to curtail this in our next research efforts.
6. CONCLUSION
In the conventional encryption scheme, messages are encoded in ASCII (or UTF-8, etc.) which
makes them prone to a brute-force attack, as an adversary who tries to decrypt a ciphertext can easily filter
out correct messages from incorrect ones based on the non-uniform distribution of the characters. Honey
encryption (HE) offers a countermeasure to the conventional encryption scheme by offering a barrier against
brute-force attacks. HE is a decoy-based encryption scheme which yields plausible looking plaintexts under
decryption with incorrect keys such that decryption attempts alone are insufficient to recover the correct
plaintext. As a result, an adversary is made to believe he has the plaintext when what he has is a
decoy-message.
In this paper, we modified the HE scheme to support the encoding of human-generated message by
leveraging natural language processing techniques. Our approach models the connection between words with
the specific goal of capturing the patterns of language to form syntactically and semantically meaningful
message as a framework to build realistic but fake messages as decoys which is served to an adversary trying
to decrypt the ciphertext using an invalid-key. For instance, an attacker that intercepts an encrypted email
message and tries to decrypt the message gets a plausible email message, and he is fooled into believing he
has the original email message. The message structure and message length contained in the underlying
message is kept entirely secret and failed decryption produces radically different message from the original
message as decoys message, and such features can be useful for successfully concealing and protecting
emails and human-written documents that are top secret.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1871 - 1878
1878
REFERENCES
[1] Gamido HV, Sison AM, Medina RP., "Modified AES for Text and Image Encryption," Indonesian Journal of
Electrical Engineering and Computer Science (IJEECS), vol. 11(3), pp. 27, May 2018.
[2] Chandrakala N, Rao BT., "Migration of Virtual Machine to improve the Security of Cloud Computing,"
International Journal of Electrical and Computer Engineering (IJECE). vol. 8(1), pp. 210-9, Feb 2018.
[3] Sultanpure KA, Gupta A, Reddy LS., “An Efficient Cloud Scheduling Algorithm for the Conservation of Energy
through Broadcasting,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8(1),
pp.179-88, Feb 2018.
[4] Singh JP, Kumar S. "Authentication and encryption in cloud computing," In Smart Technologies and Management
for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015 International Conference on 2015
May 6 , IEEE, pp. 216-219.
[5] Jaber AN, Zolkipli MF, "Use of cryptography in cloud computing. In Control System," Computing and
Engineering (ICCSCE), 2013 IEEE International Conference on 2013 Nov 29. IEEE, pp. 179-184.
[6] Chen D, Zhao H., "Data security and privacy protection issues in cloud computing," In Computer Science and
Electronics Engineering (ICCSEE), 2012 International Conference on 2012 Mar 23. IEEE, vol. 1, pp. 647-651.
[7] Omolara OE, Oludare AI, Abdulahi SE., "Developing a modified Hybrid Caesar cipher and Vigenere cipher for
secure Data Communication," Computer Engineering and Intelligent Systems, vol. 5, pp. 34-46, 2014.
[8] Stallings W, Brown L, Bauer MD, Bhattacharjee AK, "Computer security: principles and practice," Pearson
Education 2012.
[9] Lorek P, Zagórski F, Kulis M., "Strong stationary times and its use in cryptography," arXiv preprint
arXiv:1709.02631, Sep 2017.
[10] Jo HJ, Yoon JW, "A new countermeasure against brute-force attacks that use high-performance computers for big
data analysis," International Journal of Distributed Sensor Networks. vol. 11(6), pp. 406915, Jun 2015.
[11] Beunardeau M, Ferradi H, Géraud R, Naccache D., "Honey Encryption for Language," In International Conference
on Cryptology in Malaysia. Springer, Cham, pp. 127-144, Dec 2016.
[12] Kim JI, Yoon JW, "Honey chatting: A novel instant messaging system robust to eavesdropping over
communication," In Acoustics, Speech and Signal Processing (ICASSP), 2016 IEEE International Conference on
2016 Mar 20. IEEE, pp. 2184-2188.
[13] Omolara AE, Jantan A, Abiodun OI, Poston HE, "A Novel Approach for the Adaptation of Honey Encryption to
Support Natural Language Message," In Proceedings of the International MultiConference of Engineers and
Computer Scientists 2018, vol. 1, 2018.
[14] Cousins DB, Rohloff K, Sumorok D., "Designing an FPGA-accelerated homomorphic encryption co-processor,"
IEEE Transactions on Emerging Topics in Computing. vol. 5(2), pp. 193-206, Apr 2017.
[15] Kestur S, Davis JD, Williams O, "Blas comparison on FPGA, CPU and GPU. VLSI (ISVLSI)," 2010 IEEE
computer society annual symposium on 2010 Jul 5. IEEE, pp. 288-293.
[16] Sutikno T, Idris NR, Jidin A., "High-Speed Computation using FPGA for Excellent Performance of Direct Torque
Control of Induction Machines," Telecommunication Computing Electronics and Control (TELKOMNIKA),
vol. 14(1) pp. 1-3, Mar 2016.
[17] Marks M, Jantura J, Niewiadomska-Szynkiewicz E, Strzelczyk P, Góźdź K., "Heterogeneous GPU&CPU cluster
for high-performance computing in cryptography," Computer Science, vol. 13, pp. 63-79, 2012
[18] Couture N, Kent KB, "The effectiveness of brute force attacks on RC4," Communication Networks and Services
Research, 2004. Proceedings. Second Annual Conference on 2004 May 19. IEEE, pp. 333-336.
[19] Juels A, Ristenpart T., "Honey encryption: Security beyond the brute-force bound," In Annual International
Conference on the Theory and Applications of Cryptographic Techniques 2014 May 11, Springer, Berlin,
Heidelberg, pp. 293-310.
[20] Juels A, Ristenpart T., "Honey Encryption: Encryption beyond the brute-force barrier," IEEE Security & Privacy,
vol. 12(4), pp. 59-62, Jul 2014.
[21] Bird S, Loper E., "NLTK: the natural language toolkit," In Proceedings of the ACL 2004 on Interactive poster and
demonstration sessions 2004 Jul 21, Association for Computational Linguistics, pp. 31.
[22] Chowdhury GG., “Natural language processing,” Annual review of information science and technology, vol. 37(1),
pp. 51-89, Jan 2003.

More Related Content

What's hot

Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
Iaetsd Iaetsd
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
IJRAT
 
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Cryptography On Android Message Application Using Look  Up Table And Dynamic ...Cryptography On Android Message Application Using Look  Up Table And Dynamic ...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
IOSR Journals
 
Cryptography
CryptographyCryptography
Cryptography
Jasim Jas
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
pankaj kumari
 
Cryptography in formtaion security
Cryptography in formtaion securityCryptography in formtaion security
Cryptography in formtaion security
sabihabatool1
 
Presentation on Cryptography
Presentation on CryptographyPresentation on Cryptography
Presentation on Cryptography
Karan Jaiswal
 
Communication Security
Communication SecurityCommunication Security
Communication Security
Axis Communications
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
ijsrd.com
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
Techglyphs
 
Cryptography
CryptographyCryptography
Cryptography
Vicky Kamboj
 
Network Security Fundamental
Network Security FundamentalNetwork Security Fundamental
Network Security Fundamental
Mousmi Pawar
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
Manish Tiwari
 
Review on feature-based method performance in text steganography
Review on feature-based method performance in text steganographyReview on feature-based method performance in text steganography
Review on feature-based method performance in text steganography
journalBEEI
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
eSAT Journals
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
eSAT Publishing House
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
 

What's hot (20)

Iaetsd network security and
Iaetsd network security andIaetsd network security and
Iaetsd network security and
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Cryptography On Android Message Application Using Look  Up Table And Dynamic ...Cryptography On Android Message Application Using Look  Up Table And Dynamic ...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
 
Cryptography
CryptographyCryptography
Cryptography
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 
Cryptography in formtaion security
Cryptography in formtaion securityCryptography in formtaion security
Cryptography in formtaion security
 
Presentation on Cryptography
Presentation on CryptographyPresentation on Cryptography
Presentation on Cryptography
 
Communication Security
Communication SecurityCommunication Security
Communication Security
 
A Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering TechniqueA Study of Different Partitioning Clustering Technique
A Study of Different Partitioning Clustering Technique
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Bt0088 cryptography and network security1
Bt0088 cryptography and network security1Bt0088 cryptography and network security1
Bt0088 cryptography and network security1
 
Cryptography
CryptographyCryptography
Cryptography
 
Network Security Fundamental
Network Security FundamentalNetwork Security Fundamental
Network Security Fundamental
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
 
Review on feature-based method performance in text steganography
Review on feature-based method performance in text steganographyReview on feature-based method performance in text steganography
Review on feature-based method performance in text steganography
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 

Similar to Modified honey encryption scheme for encoding natural language message

Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
IRJET Journal
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
Joe Osborn
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approach
TELKOMNIKA JOURNAL
 
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET Journal
 
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdfWINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
sadinenitejaswi23cse
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
Editor IJCATR
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
IJNSA Journal
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
Asia Smith
 
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Eswar Publications
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
ijcisjournal
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
ijcisjournal
 
Seps aka a secure evolved packet system authentication and key agreement sch...
Seps aka  a secure evolved packet system authentication and key agreement sch...Seps aka  a secure evolved packet system authentication and key agreement sch...
Seps aka a secure evolved packet system authentication and key agreement sch...
csandit
 
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
cscpconf
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
Stacy Taylor
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
IJCI JOURNAL
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
FellowBuddy.com
 
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONSECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
adeij1
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
IJNSA Journal
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
Lisa Brewer
 
Secured and Encrypted Data Transmission over the Web Using Cryptography
Secured and Encrypted Data Transmission over the Web Using CryptographySecured and Encrypted Data Transmission over the Web Using Cryptography
Secured and Encrypted Data Transmission over the Web Using Cryptography
ijtsrd
 

Similar to Modified honey encryption scheme for encoding natural language message (20)

Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approach
 
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
 
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdfWINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
 
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Cryptography System for Online Communication Using Polyalphabetic Substitutio...
Cryptography System for Online Communication Using Polyalphabetic Substitutio...
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
 
Seps aka a secure evolved packet system authentication and key agreement sch...
Seps aka  a secure evolved packet system authentication and key agreement sch...Seps aka  a secure evolved packet system authentication and key agreement sch...
Seps aka a secure evolved packet system authentication and key agreement sch...
 
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONSECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
 
Secured and Encrypted Data Transmission over the Web Using Cryptography
Secured and Encrypted Data Transmission over the Web Using CryptographySecured and Encrypted Data Transmission over the Web Using Cryptography
Secured and Encrypted Data Transmission over the Web Using Cryptography
 

More from IJECEIAES

Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...
IJECEIAES
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
A review on features and methods of potential fishing zone
A review on features and methods of potential fishing zoneA review on features and methods of potential fishing zone
A review on features and methods of potential fishing zone
IJECEIAES
 
Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...
IJECEIAES
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
IJECEIAES
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
IJECEIAES
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
IJECEIAES
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
IJECEIAES
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
IJECEIAES
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
IJECEIAES
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
IJECEIAES
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 

More from IJECEIAES (20)

Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...Neural network optimizer of proportional-integral-differential controller par...
Neural network optimizer of proportional-integral-differential controller par...
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
A review on features and methods of potential fishing zone
A review on features and methods of potential fishing zoneA review on features and methods of potential fishing zone
A review on features and methods of potential fishing zone
 
Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...Electrical signal interference minimization using appropriate core material f...
Electrical signal interference minimization using appropriate core material f...
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 

Recently uploaded

Beckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview PresentationBeckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview Presentation
VanTuDuong1
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
aryanpankaj78
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
OKORIE1
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
Presentation on Food Delivery Systems
Presentation on Food Delivery SystemsPresentation on Food Delivery Systems
Presentation on Food Delivery Systems
Abdullah Al Noman
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 

Recently uploaded (20)

Beckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview PresentationBeckhoff Programmable Logic Control Overview Presentation
Beckhoff Programmable Logic Control Overview Presentation
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 
Digital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptxDigital Twins Computer Networking Paper Presentation.pptx
Digital Twins Computer Networking Paper Presentation.pptx
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
Presentation on Food Delivery Systems
Presentation on Food Delivery SystemsPresentation on Food Delivery Systems
Presentation on Food Delivery Systems
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 

Modified honey encryption scheme for encoding natural language message

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 9, No. 3, June 2019, pp. 1871~1878 ISSN: 2088-8708, DOI: 10.11591/ijece.v9i3.pp1871-1878  1871 Journal homepage: http://iaescore.com/journals/index.php/IJECE Modified honey encryption scheme for encoding natural language message Abiodun Esther Omolara, Aman Jantan School of Computer Sciences, Universiti Sains Malaysia, Penang, Malaysia Article Info ABSTRACT Article history: Received May 24, 2018 Revised Nov 27, 2018 Accepted Dec 22, 2018 Conventional encryption schemes are susceptible to brute-force attacks. This is because bytes encode utf8 (or ASCII) characters. Consequently, an adversary that intercepts a ciphertext and tries to decrypt the message by brute-forcing with an incorrect key can filter out some of the combinations of the decrypted message by observing that some of the sequences are a combination of characters which are distributed non-uniformly and form no plausible meaning. Honey encryption (HE) scheme was proposed to curtail this vulnerability of conventional encryption by producing ciphertexts yielding valid-looking, uniformly distributed but fake plaintexts upon decryption with incorrect keys. However, the scheme works for only passwords and PINS. Its adaptation to support encoding natural language messages (e-mails, human-generated documents) has remained an open problem. Existing proposals to extend the scheme to support encoding natural language messages reveals fragments of the plaintext in the ciphertext, hence, its susceptibility to chosen ciphertext attacks (CCA). In this paper, we modify the HE schemes to support the encoding of natural language messages using Natural Language Processing techniques. Our main contribution was creating a structure that allowed a message to be encoded entirely in binary. As a result of this strategy, most binary string produces syntactically correct messages which will be generated to deceive an attacker who attempts to decrypt a ciphertext using incorrect keys. We evaluate the security of our proposed scheme. Keywords: Adversary Attacker Brute-force Ciphertext Honey encryption Plaintext Copyright © 2019 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Aman Jantan, Security and Forensic Research Group (SFRG) Laboratory, School of Computer Sciences, Universiti Sains Malaysia, Malaysia. Email : styleest2011@gmail.com 1. INTRODUCTION Cryptography lies at the heart of a multitude of processes that incorporate E-Commerce, Internet Banking, Business and Social Networks, Smart Systems and so forth in our information-aware society [1], [2]. The evolution of the digital world has affected the way in which people manage finances, procure goods and access healthcare. People have become increasingly reliant on leveraging technology to enjoy instant access to information, business collaboration, family and friends [3], [4]. This trend of societal dependence on modern infrastructure has created an avenue for constant security threats and risk. This challenge has been demonstrated by incessant attacks on computer networks, credit card fraud, malware attacks, cell phones hack et cetera [5], [6]. To reinforce our computerized-reliant society for the present and future generation, and leverage on the opportunities that these technologies proffer, there is a pressing need for reliable information infrastructure with strong security requirements. An essential building block to achieve information security is cryptography [7], [8].
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1871 - 1878 1872 Cryptography is the study of the science and art of concealing information to prevent a distrusted party from learning the content of the message [9]. State-of-the-art conventional cryptographic schemes are prone to brute-force attack. A brute force attack is a trial and error approach used by an adversary to decrypt a ciphertext, for instance, an attempt to crack a user’s password. The conventional encryption schemes make it easy for an adversary to continue to employ this method and achieve success. In hindsight, all conventional encryption schemes are encoded in utf8 (or ASCII) characters. Consequently, an adversary that intercepts a ciphertext and tries to decrypt the message using a wrong key can filter out some of the combinations of the decrypted message by observing that some of the sequences are a combination of characters from different languages and also symbols which are non-uniformly distributed [10], [11]. It is safe to conclude that an adversary can judge if his attack is successful based on the structure/distribution of the message he recovers during his attacks [12], [13]. A non-uniform distribution, which forms no plausible meaning signifies an incorrect plaintext and key. Moreover, the advent of high-processing tools such as FPGA, GPU also makes the brute-force attack to be highly successful [14], [15], [16]. Therefore, an attacker that intercepts an encrypted message has a high chance of recovering the key and subsequently the message encrypted under such key by using the distinguisher technique – which is to judge the decryption output based on the distribution/structure of the message. Security experts and the cryptographic community have proposed several countermeasures to mitigate the brute-force attack on conventional encryption schemes by increasing the length of the key, computational complexity. Nevertheless, all these methods fail to address the underlying problem, which is using the distinguisher technique to inform the output of the decryption. An attacker can continue to make repeat decryptions on an oracle by trying random keys until he finds a plausible message [17-18]. A breakthrough was made in the year 2014 when Juels and Ristenpart [19-20] proposed the Honey Encryption (HE) scheme in a conference, Eurocrypt 2014. Honey encryption is a paradigm that provides and improves security beyond the conventional brute-force bounds. It provides a plausible, valid-looking but fake message when an incorrect key is used for decrypting a ciphertext. It does not yield under a brute-force attack and it was proposed for passwords and PINs and have been implemented in this regard successfully [19-20]. However, HE has not been applied for the security of natural language messages such as emails, human-generated documents and certain formats of message. The applications of the standard HE proposed by [19-20] are precisely for passwords to protect passwords or low min-entropy keys to protect high min-entropy keys. Indeed, the authors of HE left as an open challenge, its adaptation to natural language message when they made this statement, “...for human-generated messages (password vaults, e-mail, etc.) (...) is interesting as a natural language processing problem.” [19], [20]. While some research efforts have been made towards adapting the scheme to encode human-generated message, the current proposals are all susceptible to a Chosen-Ciphertext Attack (CCA). A CCA is an attack model for cryptanalysis in which the adversary collects information, at least in part, by selecting a ciphertext and decrypting it by trying random keys. This attack is inevitable when parts or fragments of the plaintext message is revealed in the decrypted message. A practical attacker can easily use the revealed parts of the message to form other parts of the message and recover the plaintext and the key. Moreover, some of the proposed approaches do not scale well; they fail to model human language when used to encode human-generated documents, thus, failing to convince the attacker that he has the target message. This paper seeks to address the shortfalls of the standard Honey encryption scheme and proposals made by the notable research efforts in this domain. The principal objective is to extend the HE schemes to adapt it for encoding natural language message. Our approach also addresses the CCA attacks which current approach fail to curtail. We employed Natural language processing tools and techniques to build convincing decoy message which will be served to an attacker that tries to decrypt a ciphertext using incorrect keys. This strategy will ultimately allow encryption of other formats specifically human-generated messages, such as emails, written documents, etc. Figure 1 presents how the conventional encryption scheme works during a brute-force attack. In summary, the contributions of this research include the following: a. Creating a structure that allows a message to be encoded entirely in binary. As a result of the encoding strategy, most binary strings produce a syntactically correct message which is capable of fooling an adversary in search of the plaintext and key. b. The proposed scheme address CCA attack by generating a message structure that does not reveal any part of the plaintext in the decoy message and failed decryption (incorrect key) produces radically different messages from the plaintext. c. Length of plaintext is concealed by appending a random binary string to the ciphertext since the decoder runs until the sentence is parsed and then stops. This way the attacker is unable to determine the length of the plaintext.
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  Modified honey encryption scheme for encoding natural language message (Abiodun Esther Omolara) 1873 d. First successful implementation of a provable secured natural-language-based honey encryption scheme and its adaptation to natural language messages. Figure 1. Brute-force attack on current conventional encryption method on a password vault An attacker that intercepts a plaintext and submits random passwords get non-uniformly distributed characters as long as he supplies an incorrect key. This is a clear distinguisher that he has not achieved the plaintext. He continues to try random keys until he gets a valid-looking message. As soon as he gets plausible, uniformly distributed characters, then he is sure he has achieved the message and the key. For example, in Figure 1, when the attacker gets ‘123456’, he knows that he has achieved the key. He is certain he has the correct key because ‘123456’ is distributed evenly and this is made worst as users tend to use simple, easy-to-guess passwords. Also, the attackers are aware of how users choose weak passwords (based on the past release of compromised passwords). 2. HONEY ENCRYPTION The intuition of Honey encryption was borne by Juels and Ristenpart [19-20] after observing the high rate of password been compromised. For instance, using conventional encryption scheme, if plaintext, P is a 16-digit Master card number encoded via ASCII and the conventional password-based encryption scheme is used as cipher, the probability that any Pi≠P is a valid ASCII encoding of a 16-digit string which is negligible, at t (10/256)16 < 2 −74 . Hence, an adversary can reject incorrect messages and recover P with a high probability [19-20]. Honey encryption provides security beyond the brute-force barrier by producing ciphertexts which, upon decryption with incorrect keys, yields plausible-looking plaintexts. The strategy here is to confound the life of the adversary by making message recovery even after trying every candidate keys to be impossible. The central component of HE is called a distribution transforming encoder (DTE). This component is constructed with an estimate of the message distribution pm. Encoding a message sampled from pm should produce a “seed” value which is uniformly distributed. The DTE is a pair of encoding and decoding algorithm. The encoding algorithm is randomized, it takes as input a message M ∈ M and outputs a value in a set S. Also, the decoding algorithm is deterministic and takes as input a value S ∈ S and outputs a message M ∈ M. When the seed is supplied, a DTE must decode correctly to the plaintext but for every incorrect key, it should decode to a plausible message sampled from the message distribution. A DTE scheme is correct if for any M ∈ M, Pr[decode(encode(M)) = M] = 1 [19-20]. The HE scheme consists of two steps usually referred to as DTE-then Encrypt. In the first step, the DTE is applied to the Message, M to obtain a Seed S. In the second step, the seed S is encrypted under a conventional encryption scheme using the key K, yielding an HE ciphertext C. The steps are as follows: a. The encoding process, where the Distribution Transforming Encoder (DTE) is applied to the plaintext followed by a conventional encryption scheme. b. The decoding process, where the Distribution Transforming Decoder (DTD) is applied to the ciphertext followed by a conventional encryption scheme. The HE algorithm showing the encode and decode process is presented in Figure 2.
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1871 - 1878 1874 Honey Encryption Algorithm: HEnc (K, M) S ¬$ encode(M) R ¬$ {0, 1}n S’ ¬ H (R, K) C ¬ S’⊕ S return (R, C) Honey Decryption Algorithm: HDec (K, (R, C)) S’¬ H (R, K) S ¬ C ⊕ S’ M ¬ decode(S) return M Figure 2. Honey encoding and decoding algorithms H represents the cryptographic hash function, K represents a key, M represents the message, S represents the seed, R represents a random string, C represents the ciphertext, and ¬$ represents uniform random assignment. 3. PROPOSED APPROACH Our approach leverages the power of deception to persuade and confuse the attacker that he has the original message. The experiment of this research are implemented with Python 3.63 and Natural Language Processing (NLP) libraries. The NLP tools capture the relationship between words and how they combine to form meaningful sentences. Readers interested in detail treatment of NLP should see [21]-[22]. The decoy message will have a completely different message structure from the original message (plaintext) but will have a semantic and contextual meaning. Each message to be encoded is treated as a string of sentence and processed as a grammatical feature in the English Language. Each word is classified based on the part of speech by its syntactic functions. In the English Language, the main parts of speech are noun, pronoun, verb, adverb, adjective, preposition, interjection, conjunction and determiner. Figure 3 shows how nouns are processed and encrypted, and Figure 4 shows a flowchart of the complete system of our proposed scheme. Figure 5 shows how nouns are processed and decrypted and Figure 6 shows a flowchart of the complete system of our proposed scheme. In summary, we create a structure that allowed a sentence to be encoded completely in binary. As a result of the encoding strategy, most binary strings produce a syntactically correct sentence. Algorithm 1: Noun Encoding 1: Get synsets for the noun if personal noun Drop synsets with non-personal meaning for the noun (i.e., using mum to refer to a flower) Else Drop synsets with personal meaning for the noun (i.e., using a dog to refer to a person) if synset list is non-empty Randomly select synset from list Else if the noun is a pronoun Set offset to the length of the list of nouns in wordnet plus one and encode in binary Encode pronoun Else Set offset to the length of the list of nouns in wordnet plus two and encode in binary Encode unknown word return binary string 2: Get the path from the root of wordnet noun tree to selected synset if personal noun Drop nodes in the path that are parents to "person noun" synset Else Drop nodes in the path until "person noun" synset is not in the path Randomly select a node in the remaining path to be subtree root Encode offset of the selected node in the list of wordnet's nouns in binary while not at the desired node (noun passed in) Append 1 to binary encoding to indicate that search is not complete Find the index of next node in the path in the list of current root's children Encode index in binary and append to a string Append 0 to binary encoding to indicate that search is complete Find index in the list of synset's lemmas of lemma containing the desired noun Encode index in binary and append to a string 3: return binary string Figure 3. Pseudocode for implementing Encrypt Algorithm of the Proposed (Modified) Honey Encryption
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  Modified honey encryption scheme for encoding natural language message (Abiodun Esther Omolara) 1875 Figure 4. Proposed encoding algorithm Algorithm 2: Noun Decoding 1: Extract offset from binary string if pronoun return decoding of the pronoun if unknown word return decoding of the unknown word 2: Get synset of a noun at given offset in the list of wordnet's nouns and set as root while not at the desired node (the first character in the binary string is non-zero) Extract offset from binary string Set child at offset in the list of root's children to new root 3: Extract lemma number from a binary string 4: Get specified lemma 5: return the name of the lemma (desired noun) Figure 5. Pseudocode for implementing decrypt algorithm of the proposed (modified) honey encryption Figure 6. Proposed decoding algorithm
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1871 - 1878 1876 Note that: Nouns in Wordnet are organized using a tree structure with general concepts at the root, moving to specific nodes at the leaves. We utilize this structure for encoding of all nouns within the encoding algorithm. Verb lemmas in Wordnet are stored with lists of verb frames. These are the possible structures of sentences using that verb. For example, "Somebody appears" is a valid sentence structure but "Somebody appears something" is not. Pronoun encoding/decoding: Have a list of pronouns, encoded as an offset in the list. Unknown encoding/decoding: Each letter encoded as a position in the alphabet (0-25) Article encoding/decoding: 0/1 for not exists/exists, then 1/0 if the/a Conjunction encoding/decoding: Have a list of conjunctions, encoded as an offset in the list. A general use case of the proposed algorithm is to combine it with any conventional cipher. For instance, the sender will encrypt this binary string with a cipher (AES, RC4, Twofish, etc.). A wrong key will produce an incorrectly encoded string which should decode to a semantically correct message. Only when the correct key is applied should the plaintext decode correctly. Any incorrect key (flipping a bit) will decode correctly to a valid message with completely different length and structure from the plaintext. Our approach is completely different from existing approach because no part of the plaintext will be revealed during decryption with incorrect key. This approach makes it impossible for the adversary to carry out a chosen ciphertext attack. We consider a case where an email is to be encoded using our approach. For instance, each email usually starts with some greeting and will usually end with a goodbye message. An adversary expecting an email who gets instead a text not starting from this type of greetings will quickly discard the message. In this case, we define encryption protocol differently. We assume that email-message should always start from the greeting and first few bits will encode one of the possible greeting’s variations. This way it is not possible for any encryption key to get the results without greetings and goodbye. Therefore, the higher probability of the decoy message is done by restricting potential user format of the message. An easy implementation will be to define three parts of the message which are allowed. For instance, 1) Greetings with one of the following options: 00 - "Hello", 01 - "Hi", 10 - "Greetings", 11 - "Good time of day"; 2) middle sentence with the following options: 00 - "how are you? "; 01-"Fine"; 10-"having a hard day"; 11 - "let's meet"; 3) Good byes: 00 - "Bye"; 10 - "Looking forward"; 01 - "have a nice day"; 11-"Best wishes” This protocol will limit amount communication very much, but every combination or key can lead to a meaningful message. There is no way for the attacker to guess if his key was incorrect. 4. RESULTS AND ANALYSIS To evaluate our proposed system, we test with a controlled amount of noise added to a ciphertext (i.e., 1% wrong, 5% wrong, etc.) and compare the sanity of resulting messages. Word Count: The number of words encoded Noise Added: Percentage of random bits flipped (incorrect key) Change in the Word Count: When the adversary tries to decrypt with the key, how many sane words were generated. Pimportant: How many important words from the underlying plaintext appear in the decrypted message when the adversary tries incorrect keys. We define Pimportant as very important keywords in the plaintext (nouns, pronoun, verb, adverb, adjective) which must not appear in the event of decryption with wrong keys. Pregular: How many regular words from the underlying plaintext appear in the decrypted message when the adversary tries incorrect keys. We define Pregular as common words in the plaintext (determiner, conjunction, interjection, preposition). This is essential because regular words help form a sentence and they appear in every message and cannot be used to recover the plaintext. For example, a, the, of, on etc are essential to form sentence. Time-taken: The time it takes to decrypt using our proposed method. Performance of the proposed modified honey encryption scheme as shown in Table 1.
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708  Modified honey encryption scheme for encoding natural language message (Abiodun Esther Omolara) 1877 Table 1. Performance of the Proposed Modified Honey Encryption Scheme Word Count Noise Added (%) (brute-forcing with incorrect keys) Change in the word and word count during decryption Check if CCA is possible (Any revealed word from the plaintext in the decrypted ciphertext?) Pimportant Pregular Time-taken to decrypt (ms) 4 4 53 0 0 1.90 7 2 59 0 4 2.23 10 3 54 0 5 3.12 15 2 62 0 4 3.23 20 3 71 0 7 4.40 25 4 88 0 6 4.89 28 5 97 0 9 7.10 38 1 105 0 6 9.30 43 8 127 0 8 10.11 48 7 156 0 9 13.21 82 5 304 0 12 31.11 5. DISCUSSION The proposed modified honey encryption scheme employs a novel approach for adapting the honey encryption scheme to support the successful encoding of human-generated message which has been an open problem since the scheme was proposed [19,20]. This novel invention brings new benefits as well as some limitations. In summary, we were able to create a structure where messages are encoded in binary such that message recovery becomes impossible for an adversary that intercepts a ciphertext and tries to decrypt it using random keys. The standard HE scheme was designed and provides provable security only in the context of Passwords, Pins and RSA Keys. Research efforts over the years to extend it for encoding larger domains (such as human-generated message) has failed to produce convincing decoy message, do not scale well. Worst is they reveal structural information of the underlying plaintext, thus, the vulnerability to chosen ciphertext attack (CCA) which makes the probability of message recovery high. Our proposed approach is the first successful implementation of adapting the honey encryption scheme for supporting encoding of human-generated message. It produces a plausible message that is good enough to deceive the adversary. More importantly, the critical message (keywords) that the sender might want to protect is completely concealed and cannot appear during decryption with incorrect keys, thereby, countering the CCA. However, we must state that our approach impacts time when the message gets larger. For this limitation, we are thinking of other ways to curtail this in our next research efforts. 6. CONCLUSION In the conventional encryption scheme, messages are encoded in ASCII (or UTF-8, etc.) which makes them prone to a brute-force attack, as an adversary who tries to decrypt a ciphertext can easily filter out correct messages from incorrect ones based on the non-uniform distribution of the characters. Honey encryption (HE) offers a countermeasure to the conventional encryption scheme by offering a barrier against brute-force attacks. HE is a decoy-based encryption scheme which yields plausible looking plaintexts under decryption with incorrect keys such that decryption attempts alone are insufficient to recover the correct plaintext. As a result, an adversary is made to believe he has the plaintext when what he has is a decoy-message. In this paper, we modified the HE scheme to support the encoding of human-generated message by leveraging natural language processing techniques. Our approach models the connection between words with the specific goal of capturing the patterns of language to form syntactically and semantically meaningful message as a framework to build realistic but fake messages as decoys which is served to an adversary trying to decrypt the ciphertext using an invalid-key. For instance, an attacker that intercepts an encrypted email message and tries to decrypt the message gets a plausible email message, and he is fooled into believing he has the original email message. The message structure and message length contained in the underlying message is kept entirely secret and failed decryption produces radically different message from the original message as decoys message, and such features can be useful for successfully concealing and protecting emails and human-written documents that are top secret.
  • 8.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 9, No. 3, June 2019 : 1871 - 1878 1878 REFERENCES [1] Gamido HV, Sison AM, Medina RP., "Modified AES for Text and Image Encryption," Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 11(3), pp. 27, May 2018. [2] Chandrakala N, Rao BT., "Migration of Virtual Machine to improve the Security of Cloud Computing," International Journal of Electrical and Computer Engineering (IJECE). vol. 8(1), pp. 210-9, Feb 2018. [3] Sultanpure KA, Gupta A, Reddy LS., “An Efficient Cloud Scheduling Algorithm for the Conservation of Energy through Broadcasting,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8(1), pp.179-88, Feb 2018. [4] Singh JP, Kumar S. "Authentication and encryption in cloud computing," In Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015 International Conference on 2015 May 6 , IEEE, pp. 216-219. [5] Jaber AN, Zolkipli MF, "Use of cryptography in cloud computing. In Control System," Computing and Engineering (ICCSCE), 2013 IEEE International Conference on 2013 Nov 29. IEEE, pp. 179-184. [6] Chen D, Zhao H., "Data security and privacy protection issues in cloud computing," In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on 2012 Mar 23. IEEE, vol. 1, pp. 647-651. [7] Omolara OE, Oludare AI, Abdulahi SE., "Developing a modified Hybrid Caesar cipher and Vigenere cipher for secure Data Communication," Computer Engineering and Intelligent Systems, vol. 5, pp. 34-46, 2014. [8] Stallings W, Brown L, Bauer MD, Bhattacharjee AK, "Computer security: principles and practice," Pearson Education 2012. [9] Lorek P, Zagórski F, Kulis M., "Strong stationary times and its use in cryptography," arXiv preprint arXiv:1709.02631, Sep 2017. [10] Jo HJ, Yoon JW, "A new countermeasure against brute-force attacks that use high-performance computers for big data analysis," International Journal of Distributed Sensor Networks. vol. 11(6), pp. 406915, Jun 2015. [11] Beunardeau M, Ferradi H, Géraud R, Naccache D., "Honey Encryption for Language," In International Conference on Cryptology in Malaysia. Springer, Cham, pp. 127-144, Dec 2016. [12] Kim JI, Yoon JW, "Honey chatting: A novel instant messaging system robust to eavesdropping over communication," In Acoustics, Speech and Signal Processing (ICASSP), 2016 IEEE International Conference on 2016 Mar 20. IEEE, pp. 2184-2188. [13] Omolara AE, Jantan A, Abiodun OI, Poston HE, "A Novel Approach for the Adaptation of Honey Encryption to Support Natural Language Message," In Proceedings of the International MultiConference of Engineers and Computer Scientists 2018, vol. 1, 2018. [14] Cousins DB, Rohloff K, Sumorok D., "Designing an FPGA-accelerated homomorphic encryption co-processor," IEEE Transactions on Emerging Topics in Computing. vol. 5(2), pp. 193-206, Apr 2017. [15] Kestur S, Davis JD, Williams O, "Blas comparison on FPGA, CPU and GPU. VLSI (ISVLSI)," 2010 IEEE computer society annual symposium on 2010 Jul 5. IEEE, pp. 288-293. [16] Sutikno T, Idris NR, Jidin A., "High-Speed Computation using FPGA for Excellent Performance of Direct Torque Control of Induction Machines," Telecommunication Computing Electronics and Control (TELKOMNIKA), vol. 14(1) pp. 1-3, Mar 2016. [17] Marks M, Jantura J, Niewiadomska-Szynkiewicz E, Strzelczyk P, Góźdź K., "Heterogeneous GPU&CPU cluster for high-performance computing in cryptography," Computer Science, vol. 13, pp. 63-79, 2012 [18] Couture N, Kent KB, "The effectiveness of brute force attacks on RC4," Communication Networks and Services Research, 2004. Proceedings. Second Annual Conference on 2004 May 19. IEEE, pp. 333-336. [19] Juels A, Ristenpart T., "Honey encryption: Security beyond the brute-force bound," In Annual International Conference on the Theory and Applications of Cryptographic Techniques 2014 May 11, Springer, Berlin, Heidelberg, pp. 293-310. [20] Juels A, Ristenpart T., "Honey Encryption: Encryption beyond the brute-force barrier," IEEE Security & Privacy, vol. 12(4), pp. 59-62, Jul 2014. [21] Bird S, Loper E., "NLTK: the natural language toolkit," In Proceedings of the ACL 2004 on Interactive poster and demonstration sessions 2004 Jul 21, Association for Computational Linguistics, pp. 31. [22] Chowdhury GG., “Natural language processing,” Annual review of information science and technology, vol. 37(1), pp. 51-89, Jan 2003.