An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption

Honey Encryption (HE) is a cryptosystem used as a reinforcement to the conventional encryption scheme to address brute-force attacks specifically in the context of password-based encryption systems. The HE scheme relies on a model called the Distribution Transforming Encoder (DTE), which focuses on...

全面介紹

Saved in:
書目詳細資料
主要作者: Omolara, Abiodun Esther
格式: Thesis
語言:English
出版: 2020
主題:
在線閱讀:http://eprints.usm.my/54016/1/ABIODUN%20ESTHER%20OMOLARA%27S%20THESIS.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:Honey Encryption (HE) is a cryptosystem used as a reinforcement to the conventional encryption scheme to address brute-force attacks specifically in the context of password-based encryption systems. The HE scheme relies on a model called the Distribution Transforming Encoder (DTE), which focuses on the use of deception as a key defensive approach in the design of primitives that facilitate information security by yielding plausible-looking but fake plaintext during decryption using an incorrect key. However, the concept of the HE scheme is limited by the bottleneck of applicability and thus fails to reach other real-world deployment use-cases. For instance, encoding a human-generated message such as email requires adapting the scheme to natural language which means re-designing the current deterministic encoder to generate plausible or realistic decoys message that can fool the attacker. This problem remains unsolved because of the few researches on enhancing the DTE fails to produce plausible decoy messages in human-language. Furthermore, they fail to introduce secrecy on the fake message as keywords or fragments of the underlying plaintext message are revealed during decryption, thus, enabling the system to a chosen-ciphertext attack where an attacker may use the results from prior decryption to inform their choices of which ciphertexts have decrypted. The two main contributions of this work are its responses to these two problems. A natural language-based encoder (NLBE) was developed and an approach for concealing the underlying plaintext and producing plausible decoy messages is presented. Experimental analysis using human simulators as the gold standard shows a 94% indistinguishability rate in the worst case where an unbounded adversary can explore the complete Oracle and a 100% indistinguishability rate when the keyspace is large enough.