HONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION

Abstract—Instant messaging (IM) is a mobile apps with one of the most user in Indonesia. Conversation using IM is a private one and an encryption system is needed in order to ensure the privacy of those conversations. In theory, every single encryption system is weak against brute-force attack. E...

Full description

Saved in:
Bibliographic Details
Main Author: Ghifari - NIM: 18214005, Aditya
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/25021
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:25021
spelling id-itb.:250212018-10-01T09:12:57ZHONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION Ghifari - NIM: 18214005, Aditya Indonesia Final Project INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/25021 Abstract—Instant messaging (IM) is a mobile apps with one of the most user in Indonesia. Conversation using IM is a private one and an encryption system is needed in order to ensure the privacy of those conversations. In theory, every single encryption system is weak against brute-force attack. Encryption system that depends on complexity of the key used is privy to the danger of the development of computational ability. In order to ensure the safety of the system, key that were used in the encryption system are updated regularly. <br /> <br /> <br /> <br /> In this final project report, we will discuss the possibility of implementing an encryption system that could deal with this brute-force attack, named Honey Encryption. Honey encryption is an encryption scheme that gives out false message instead of a ciphertext when an attacker attempt to decrypt an encrypted message using invalid key. This encryption scheme is created in order to prevent brute-force attack. By generating plausible looking message, the attacker couldn’t differentiate the original message and the fake message.Other thing to note is that IM apps is directly used by human and implementing Natural Language Processing (NLP) could result in a better system. <br /> <br /> <br /> <br /> The system which is implemented in this report already been tested and the output received is indeed in form of a sentence and not a ciphertext. The problem is that some of those sentence could not form a sentence that have meanings. The implemented system also could not recognized non-alphabetical characters except space. Further improvement on the system could be done by using more training data and create a more robust and compact codebook. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description Abstract—Instant messaging (IM) is a mobile apps with one of the most user in Indonesia. Conversation using IM is a private one and an encryption system is needed in order to ensure the privacy of those conversations. In theory, every single encryption system is weak against brute-force attack. Encryption system that depends on complexity of the key used is privy to the danger of the development of computational ability. In order to ensure the safety of the system, key that were used in the encryption system are updated regularly. <br /> <br /> <br /> <br /> In this final project report, we will discuss the possibility of implementing an encryption system that could deal with this brute-force attack, named Honey Encryption. Honey encryption is an encryption scheme that gives out false message instead of a ciphertext when an attacker attempt to decrypt an encrypted message using invalid key. This encryption scheme is created in order to prevent brute-force attack. By generating plausible looking message, the attacker couldn’t differentiate the original message and the fake message.Other thing to note is that IM apps is directly used by human and implementing Natural Language Processing (NLP) could result in a better system. <br /> <br /> <br /> <br /> The system which is implemented in this report already been tested and the output received is indeed in form of a sentence and not a ciphertext. The problem is that some of those sentence could not form a sentence that have meanings. The implemented system also could not recognized non-alphabetical characters except space. Further improvement on the system could be done by using more training data and create a more robust and compact codebook.
format Final Project
author Ghifari - NIM: 18214005, Aditya
spellingShingle Ghifari - NIM: 18214005, Aditya
HONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION
author_facet Ghifari - NIM: 18214005, Aditya
author_sort Ghifari - NIM: 18214005, Aditya
title HONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION
title_short HONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION
title_full HONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION
title_fullStr HONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION
title_full_unstemmed HONEY ENCRYPTION DESIGN AND IMPLEMENTATION IN A MESSAGE ENCRYPTION
title_sort honey encryption design and implementation in a message encryption
url https://digilib.itb.ac.id/gdl/view/25021
_version_ 1822921423702720512