HONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION
Abstract—Instant messaging (IM) is a mobile apps with one of the most user in Indonesia. Conversation using IM is a private one and an encryption system is needed in order to ensure the privacy of those conversations. In theory, every single encryption system is weak against brute-force attack. E...
Saved in:
Main Author: | |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/25021 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
id |
id-itb.:25021 |
---|---|
spelling |
id-itb.:250212018-10-01T09:12:57ZHONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION Ghifari - NIM: 18214005, Aditya Indonesia Final Project INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/25021 Abstract—Instant messaging (IM) is a mobile apps with one of the most user in Indonesia. Conversation using IM is a private one and an encryption system is needed in order to ensure the privacy of those conversations. In theory, every single encryption system is weak against brute-force attack. Encryption system that depends on complexity of the key used is privy to the danger of the development of computational ability. In order to ensure the safety of the system, key that were used in the encryption system are updated regularly. <br /> <br /> <br /> <br /> In this final project report, we will discuss the possibility of implementing an encryption system that could deal with this brute-force attack, named Honey Encryption. Honey encryption is an encryption scheme that gives out false message instead of a ciphertext when an attacker attempt to decrypt an encrypted message using invalid key. This encryption scheme is created in order to prevent brute-force attack. By generating plausible looking message, the attacker couldn’t differentiate the original message and the fake message.Other thing to note is that IM apps is directly used by human and implementing Natural Language Processing (NLP) could result in a better system. <br /> <br /> <br /> <br /> The system which is implemented in this report already been tested and the output received is indeed in form of a sentence and not a ciphertext. The problem is that some of those sentence could not form a sentence that have meanings. The implemented system also could not recognized non-alphabetical characters except space. Further improvement on the system could be done by using more training data and create a more robust and compact codebook. text |
institution |
Institut Teknologi Bandung |
building |
Institut Teknologi Bandung Library |
continent |
Asia |
country |
Indonesia Indonesia |
content_provider |
Institut Teknologi Bandung |
collection |
Digital ITB |
language |
Indonesia |
description |
Abstract—Instant messaging (IM) is a mobile apps with one of the most user in Indonesia. Conversation using IM is a private one and an encryption system is needed in order to ensure the privacy of those conversations. In theory, every single encryption system is weak against brute-force attack. Encryption system that depends on complexity of the key used is privy to the danger of the development of computational ability. In order to ensure the safety of the system, key that were used in the encryption system are updated regularly. <br />
<br />
<br />
<br />
In this final project report, we will discuss the possibility of implementing an encryption system that could deal with this brute-force attack, named Honey Encryption. Honey encryption is an encryption scheme that gives out false message instead of a ciphertext when an attacker attempt to decrypt an encrypted message using invalid key. This encryption scheme is created in order to prevent brute-force attack. By generating plausible looking message, the attacker couldn’t differentiate the original message and the fake message.Other thing to note is that IM apps is directly used by human and implementing Natural Language Processing (NLP) could result in a better system. <br />
<br />
<br />
<br />
The system which is implemented in this report already been tested and the output received is indeed in form of a sentence and not a ciphertext. The problem is that some of those sentence could not form a sentence that have meanings. The implemented system also could not recognized non-alphabetical characters except space. Further improvement on the system could be done by using more training data and create a more robust and compact codebook. |
format |
Final Project |
author |
Ghifari - NIM: 18214005, Aditya |
spellingShingle |
Ghifari - NIM: 18214005, Aditya HONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION |
author_facet |
Ghifari - NIM: 18214005, Aditya |
author_sort |
Ghifari - NIM: 18214005, Aditya |
title |
HONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION |
title_short |
HONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION |
title_full |
HONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION |
title_fullStr |
HONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION |
title_full_unstemmed |
HONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION |
title_sort |
honey encryption design and implementation in a message encryption |
url |
https://digilib.itb.ac.id/gdl/view/25021 |
_version_ |
1822921423702720512 |