Efficiency Analysis of Honey Encryption Algorithm

Authors

  • Bhoomika R Post Graduate Scholar, Dayananda Sagar of Arts Science and Commerce, Bangalore University, Bangalore, India
  • Narsimha GD Post Graduate Scholar, Dayananda Sagar of Arts Science and Commerce, Bangalore University, Bangalore, India
  • Abhishek V Post Graduate Scholar, Dayananda Sagar of Arts Science and Commerce, Bangalore University, Bangalore, India
  • Bharathi H Post Graduate Scholar, Dayananda Sagar of Arts Science and Commerce, Bangalore University, Bangalore, India

Keywords:

Cryptography, Security, Password

Abstract

In the field of cyber security, we have many algorithms that support cryptography. These algorithms are more prone to cyber-attacks and can be cracked easily by hash cracking tools. One of the methods to prevents these attacks is Honey Encryption technique that has gained popularity in recent years. This method provides another layer of protection when the intruder tries to hack an account with bogus data. In this paper, we are efficiently increasing the probability of Honey Encryption by generating more hash keys(password)using python programming approach. Honey encryption helps in minimization of vulnerability. We have designed an algorithm which eventually increases the buffer size for the randomly generated passwords.

References

[1] Mihir Bellare, Thomas Ristenpart, and Stefano Tessaro. Multi-instance security and its application to password-based cryptography. In Advances in Cryptology–CRYPTO 2012, pages 312–329. Springer Berlin Heidelberg, 2012.

[2] M. Preetha et al, International Journal of Computer Science and Mobile Computing Vol.2 Issue. 6, June- 2013, pg. 126-130

[3] M. Bakker and R. V. D. Jagt, “GPU-based password cracking. Technical report,” Univ. of Amsterdam, 2010

[4] Joseph Jaeger, Thomas Ristenpart, Qiang Tang. Honey Encryption Beyond Message Recovery Security. Presented in EUROCRYPT2016 pages 1 and 2, 2016.

[5] TIOBE Software Index (2011). "TIOBE Programming Community Index Python". 1

[6]"Programming Language Trends - O`Reilly Radar". Radar.oreilly.com. 2 August 2006.

[7] "The RedMonk Programming Language Rankings: January 2011 – ecosystems". Redmonk.com.

[8] H. Bojinov, E. Bursztein, X. Boyen, and D. Boneh. Kamouflage: loss-resistant password management. In ESORICS, pages 286–302, 2010.

Downloads

Published

2025-11-25

How to Cite

[1]
R. Bhoomika, G. D. Narsimha, V. Abhishek, and H. Bharathi, “Efficiency Analysis of Honey Encryption Algorithm”, Int. J. Comp. Sci. Eng., vol. 7, no. 9, pp. 12–14, Nov. 2025.