Please enable JavaScript.
Coggle requires JavaScript to display documents.
Honey Encryption - Coggle Diagram
Honey Encryption
Working Principle
Wrong key-> fake message
Correct key->Real message
multiple plausible plain text
Distribution Transforming Encoder
Uniform distribution
core component of HE
maps plain text to seed space
Introduction
Concept of deceptive encryption
purpose of honey encryption
Definitions
limitaions
complex implementation
Not suitable for random data
Need accurate data distribution
use cases
Password protection
Secure databases
cloud storage security
Security Advantages
misleads attacker
no key verification process
resist brute force attack
Comparison with traditional encryption
Honey Encryption
Wrong key->believable output
Traditional Encryption
wrong key->garbage output