Web Application:(with) HoneyWords and HoneyEncryption

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2

Abstract

It has become much easier for an attacker to steal hash passwords and enter into the account through legitimate user by cracking the hash passwords. So, for each user account, the legitimate password is stored with several honeywords in order to sense impersonation. If honeywords are selected properly, an adversary who steals a file of hashed passwords cannot be sure if it is the real password or a honeyword for any account. Moreover, entering with a honeyword to login will trigger an alarm notifying the administrator about a password file breach. Here I am implementing Honey Encryption for the protection of data stored by the user in a web application, that produces a cipher text, which, when decrypted with an incorrect key as guessed by the attacker, presents a plausible-looking yet incorrect plaintext password or encryption key.

Authors and Affiliations

Keywords

Related Articles

A Secure Multilayer Honeypot in an E-Commerce Web Application

E-commerce web applications are on a verge of not providing fair chance to all the consumers. E-commerce can be unfair especially in case of the check-out process as when many business trading corp. are vying for the lim...

Supplementation of Lactic Acid and Citric Acid in Diets Replacing Antibiotic and its Influence on Broiler Performance, Meat Yield and Immune Response up to 42 Days of Age

The present study aimed at evaluating two organic acids, Lactic acid (LA) and Citric acid (CA), each of which at 1.0 and 2.0% levels for replacing antibiotic (AB-Virginiamycin 11mg/kg) from diets. In a feeding trial with...

Parallel Content Matching In Publish/Subscribe Systems

Publish/Subscribe (Pub/Sub) system is the more optimized implementation of complex event processing system, in which user gives the interest (subscriptions) and some other party publishes the event (e.g. Stock quotes). T...

Implementation of Wireless Sensor Network Communication Terminal based on RTOS

Implementation of Wireless Sensor Network Communication Terminal based on RTOS

Analysis of Protective Mechanism in Roaming Network for Secure Communication

Roaming means the expansion of a wireless network service in an location that is different from registered home network. Roaming service provide mobile subscriber the capability to move from one access point to other for...

Download PDF file
  • EP ID EP356727
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

(2015). Web Application:(with) HoneyWords and HoneyEncryption. UNKNOWN, 4(2), -. https://europub.co.uk/articles/-A-356727