Screening the covert key using honey encryption to rule out the brute force attack of AES—a survey

Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be sent out via a safe secured channel. The advanced encryption standard (AES) is mentioned as the best standard encryption algorithm by the US...

Full description

Saved in:
Bibliographic Details
Published inSecurity and communication networks Vol. 9; no. 18; pp. 6379 - 6385
Main Authors Dharshini, P, Arokia Renjith, J, Mohan Kumar, P
Format Journal Article
LanguageEnglish
Published London John Wiley & Sons, Inc 01.12.2016
Subjects
Online AccessGet full text
ISSN1939-0114
1939-0122
DOI10.1002/sec.1753

Cover

Abstract Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be sent out via a safe secured channel. The advanced encryption standard (AES) is mentioned as the best standard encryption algorithm by the US government, but there is one major attack on the AES that is the brute force attack. So, how to rule out these kinds of attack and how it is implemented effectively in hardware are being discussed in this paper. The honey encryption scheme is an effective algorithm, and it is also being discussed. In this paper, the detailed description of the AES and the methods to improve its speed and how it is integrated with the honey technique have been discussed. The different kinds of attacks and the various solutions are discussed for both of the algorithms. A survey of papers which has used these algorithms for various reasons with different perspective has been given. The honey algorithm creates the fake message for the wrong try of the key puncher. Thus, this is considered as the best algorithm, but it is also has some disadvantages that is also focussed in our survey. Copyright © 2017 John Wiley & Sons, Ltd. The above diagram shows the general architecture of how the plain text is encrypted with a honey encryption algorithm. The encrypted text is sent to the receiver node in the knowledge of the receiver. The receiver decrypts the cipher text and gets the original text without suffering from any mode of attacks.
AbstractList Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be sent out via a safe secured channel. The advanced encryption standard (AES) is mentioned as the best standard encryption algorithm by the US government, but there is one major attack on the AES that is the brute force attack. So, how to rule out these kinds of attack and how it is implemented effectively in hardware are being discussed in this paper. The honey encryption scheme is an effective algorithm, and it is also being discussed. In this paper, the detailed description of the AES and the methods to improve its speed and how it is integrated with the honey technique have been discussed. The different kinds of attacks and the various solutions are discussed for both of the algorithms. A survey of papers which has used these algorithms for various reasons with different perspective has been given. The honey algorithm creates the fake message for the wrong try of the key puncher. Thus, this is considered as the best algorithm, but it is also has some disadvantages that is also focussed in our survey. Copyright © 2017 John Wiley & Sons, Ltd.
Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be sent out via a safe secured channel. The advanced encryption standard (AES) is mentioned as the best standard encryption algorithm by the US government, but there is one major attack on the AES that is the brute force attack. So, how to rule out these kinds of attack and how it is implemented effectively in hardware are being discussed in this paper. The honey encryption scheme is an effective algorithm, and it is also being discussed. In this paper, the detailed description of the AES and the methods to improve its speed and how it is integrated with the honey technique have been discussed. The different kinds of attacks and the various solutions are discussed for both of the algorithms. A survey of papers which has used these algorithms for various reasons with different perspective has been given. The honey algorithm creates the fake message for the wrong try of the key puncher. Thus, this is considered as the best algorithm, but it is also has some disadvantages that is also focussed in our survey. Copyright © 2017 John Wiley & Sons, Ltd. The above diagram shows the general architecture of how the plain text is encrypted with a honey encryption algorithm. The encrypted text is sent to the receiver node in the knowledge of the receiver. The receiver decrypts the cipher text and gets the original text without suffering from any mode of attacks.
Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be sent out via a safe secured channel. The advanced encryption standard (AES) is mentioned as the best standard encryption algorithm by the US government, but there is one major attack on the AES that is the brute force attack. So, how to rule out these kinds of attack and how it is implemented effectively in hardware are being discussed in this paper. The honey encryption scheme is an effective algorithm, and it is also being discussed. In this paper, the detailed description of the AES and the methods to improve its speed and how it is integrated with the honey technique have been discussed. The different kinds of attacks and the various solutions are discussed for both of the algorithms. A survey of papers which has used these algorithms for various reasons with different perspective has been given. The honey algorithm creates the fake message for the wrong try of the key puncher. Thus, this is considered as the best algorithm, but it is also has some disadvantages that is also focussed in our survey. The above diagram shows the general architecture of how the plain text is encrypted with a honey encryption algorithm. The encrypted text is sent to the receiver node in the knowledge of the receiver. The receiver decrypts the cipher text and gets the original text without suffering from any mode of attacks.
Author Mohan Kumar, P
Arokia Renjith, J
Dharshini, P
Author_xml – sequence: 1
  givenname: P
  surname: Dharshini
  fullname: Dharshini, P
  organization: Department of CSE
– sequence: 2
  givenname: J
  surname: Arokia Renjith
  fullname: Arokia Renjith, J
  organization: Department of CSE
– sequence: 3
  givenname: P
  surname: Mohan Kumar
  fullname: Mohan Kumar, P
  email: mohankumarmohan@gmail.com
  organization: Department of CSE
BookMark eNp1kMtKw0AUhgepYFsFH2HAjZvUuaTJzLKUeoGCi-o6TCYnNm2aqTOTSnY-hE_ok5i0olB0dQ6H7_85fAPUq0wFCF1SMqKEsBsHekTjMT9BfSq5DAhlrPez0_AMDZxbERLRMA77KFtoC1AV1Qv2S8Da7MB6vIYG1647Ltv2BkOlbbP1hamwN9jWJWBT-30itbUHnBurASvvlV5jk-PJbPH5_qGwq-0OmnN0mqvSwcX3HKLn29nT9D6YP949TCfzQHMW8UDkjNNUpVEkOaexGCs6zkLFMiojnulQkjwjLAQQEIk0bw9USpVJYETINBZ8iK4PvVtrXmtwPtkUTkNZqgpM7RIqWgskIlHYoldH6MrUtmq_aynBaMxJyH8LtTXOWciTrS02yjYJJUmnO2l1J53uFh0dobrwqlPmrSrKvwLBIfBWlND8W5wsZtM9_wXZ6ZJ5
CitedBy_id crossref_primary_10_1007_s12083_021_01175_6
Cites_doi 10.1109/PERVASIVE.2015.7087102
10.1109/SP.2015.36
10.1080/19361610.2014.883295
10.1109/DSD.2006.40
10.1145/2756601.2756606
10.1145/2508859.2516671
10.1109/ICNM.2009.4907203
10.1080/19361610.2013.825753
10.1109/SMC.2014.6974088
10.1109/TIFS.2014.2383359
ContentType Journal Article
Copyright Copyright © 2017 John Wiley & Sons, Ltd.
Copyright © 2016 John Wiley & Sons, Ltd.
Copyright_xml – notice: Copyright © 2017 John Wiley & Sons, Ltd.
– notice: Copyright © 2016 John Wiley & Sons, Ltd.
DBID AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1002/sec.1753
DatabaseName CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database
CrossRef

Technology Research Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-0122
EndPage 6385
ExternalDocumentID 4321295911
10_1002_sec_1753
SEC1753
Genre reviewArticle
GroupedDBID .4S
.DC
05W
0R~
123
1OC
24P
31~
3SF
4.4
52U
5DZ
66C
8-1
8UM
AAESR
AAEVG
AAFWJ
AAJEY
AANHP
AAONW
AAZKR
ACBWZ
ACCMX
ACGFO
ACRPL
ACXQS
ACYXJ
ADBBV
ADIZJ
ADNMO
AEIMD
AENEX
AFBPY
AFKRA
AJXKR
ALMA_UNASSIGNED_HOLDINGS
AMBMR
ARAPS
ARCSS
ASPBG
ATUGU
AVWKF
AZFZN
AZVAB
BCNDV
BDRZF
BENPR
BGLVJ
BHBCM
BNHUX
BOGZA
BRXPI
CCPQU
CS3
DR2
DU5
EBS
EIS
EJD
F1Z
FEDTE
G-S
GODZA
GROUPED_DOAJ
H13
HCIFZ
HVGLF
HZ~
IAO
ICD
IX1
K7-
LH4
LITHE
LW6
MY.
MY~
NNB
O9-
OIG
OK1
P2P
PIMPY
RHX
ROL
SUPJJ
TH9
TUS
W99
WBKPD
XV2
AAMMB
AAYXX
ADMLS
AEFGJ
AGQPQ
AGXDD
AIDQK
AIDYY
CITATION
PUEGO
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c3263-8f231bab669331785a15d4a2d1963dc490fd024ee8e68bfc49199ad9e2089b783
IEDL.DBID DR2
ISSN 1939-0114
IngestDate Thu Sep 04 15:48:41 EDT 2025
Mon Sep 08 09:43:13 EDT 2025
Wed Oct 01 02:25:56 EDT 2025
Thu Apr 24 23:05:23 EDT 2025
Wed Jan 22 16:46:32 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 18
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c3263-8f231bab669331785a15d4a2d1963dc490fd024ee8e68bfc49199ad9e2089b783
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
PQID 1882173043
PQPubID 1046363
PageCount 7
ParticipantIDs proquest_miscellaneous_1893906064
proquest_journals_1882173043
crossref_primary_10_1002_sec_1753
crossref_citationtrail_10_1002_sec_1753
wiley_primary_10_1002_sec_1753_SEC1753
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate December 2016
2016-12-00
20161201
PublicationDateYYYYMMDD 2016-12-01
PublicationDate_xml – month: 12
  year: 2016
  text: December 2016
PublicationDecade 2010
PublicationPlace London
PublicationPlace_xml – name: London
PublicationTitle Security and communication networks
PublicationYear 2016
Publisher John Wiley & Sons, Inc
Publisher_xml – name: John Wiley & Sons, Inc
References 2009
2006
2015
2014
2013
2002
2014; 9
2011
2013; 8
2010
2006; 55
2014; 12
e_1_2_7_6_1
e_1_2_7_5_1
e_1_2_7_4_1
e_1_2_7_3_1
e_1_2_7_9_1
e_1_2_7_8_1
e_1_2_7_19_1
e_1_2_7_18_1
e_1_2_7_17_1
e_1_2_7_16_1
e_1_2_7_2_1
Chih‐Hsu Yen Bing‐Fei W (e_1_2_7_7_1) 2006; 55
e_1_2_7_15_1
e_1_2_7_14_1
e_1_2_7_13_1
e_1_2_7_12_1
e_1_2_7_11_1
e_1_2_7_10_1
Aris Juels A (e_1_2_7_20_1) 2014; 12
References_xml – year: 2011
– year: 2009
– volume: 12
  issue: 4
  year: 2014
  article-title: Honey encryption: encryption beyond the brute‐force barrier. Security & Privacy
  publication-title: IEEE
– volume: 9
  start-page: 172
  issue: 2
  year: 2014
  end-page: 184
  article-title: Encryption‐based secure sharing of data with fine‐grained access control in public clouds
  publication-title: Journal of Applied Security Research
– year: 2014
– year: 2002
– volume: 8
  start-page: 467
  issue: 4
  year: 2013
  end-page: 476
  article-title: Dynamic programming based encrypted reversible data hiding in images
  publication-title: Journal of Applied Security Research
– year: 2015
– volume: 55
  issue: 6
  year: 2006
  article-title: Simple error detection methods for hardware implementation of Advanced Encryption Standard
  publication-title: Computers, IEEE Transactions on
– year: 2010
– year: 2006
– year: 2013
– ident: e_1_2_7_8_1
– ident: e_1_2_7_12_1
  doi: 10.1109/PERVASIVE.2015.7087102
– ident: e_1_2_7_2_1
– ident: e_1_2_7_6_1
  doi: 10.1109/SP.2015.36
– ident: e_1_2_7_13_1
– ident: e_1_2_7_18_1
  doi: 10.1080/19361610.2014.883295
– ident: e_1_2_7_14_1
– ident: e_1_2_7_3_1
– ident: e_1_2_7_10_1
  doi: 10.1109/DSD.2006.40
– ident: e_1_2_7_19_1
– ident: e_1_2_7_11_1
  doi: 10.1145/2756601.2756606
– volume: 12
  issue: 4
  year: 2014
  ident: e_1_2_7_20_1
  article-title: Honey encryption: encryption beyond the brute‐force barrier. Security & Privacy
  publication-title: IEEE
– ident: e_1_2_7_4_1
  doi: 10.1145/2508859.2516671
– ident: e_1_2_7_9_1
  doi: 10.1109/ICNM.2009.4907203
– volume: 55
  issue: 6
  year: 2006
  ident: e_1_2_7_7_1
  article-title: Simple error detection methods for hardware implementation of Advanced Encryption Standard
  publication-title: Computers, IEEE Transactions on
– ident: e_1_2_7_17_1
  doi: 10.1080/19361610.2013.825753
– ident: e_1_2_7_5_1
  doi: 10.1109/SMC.2014.6974088
– ident: e_1_2_7_15_1
– ident: e_1_2_7_16_1
  doi: 10.1109/TIFS.2014.2383359
SSID ssj0061474
Score 2.0369182
SecondaryResourceType review_article
Snippet Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 6379
SubjectTerms AES encryption
Algorithms
brute force attack
Channels
Communication networks
Encryption
Honey
honey encryption
Receivers
Texts
Title Screening the covert key using honey encryption to rule out the brute force attack of AES—a survey
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fsec.1753
https://www.proquest.com/docview/1882173043
https://www.proquest.com/docview/1893906064
Volume 9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  issn: 1939-0114
  databaseCode: ADMLS
  dateStart: 20110501
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVWIB
  databaseName: Wiley Online Library - Core collection (SURFmarket)
  issn: 1939-0114
  databaseCode: DR2
  dateStart: 20070101
  customDbUrl:
  isFulltext: true
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA7iSQ--xdVVIoieuvaRxua4LLssgh5cFwQPJUlTBWUr3VTQkz_CX-gvcaaP9YGCeGpoJ2mazEy-NJMvhBxEfsLdRKeOMSZyGA99RyqFXIRKpYDmDBO4G_nsnA_H7PQqvKqjKnEvTMUPMfvhhpZR-ms0cKmmxx-koVOjO0gzCe7XC3g5m7qYMUfBoHNSLyhjOJDHGt5Z1z9uMn4diT7g5WeQWo4yg2Vy3dSvCi656xRWdfTzN-rG_33AClmqwSftVtqySubMZI0sfqIkXCfJSGMkDqQpQEOqMcLTUrB0ihHyN_Q2m0AaVDt_Kp0NtRnNi3tDs8KWOVReWEMBCmtDpbVS39Espd3-6O3lVdJpkT-apw0yHvQve0OnPonB0QDvAidKAQYqqTgXAQCOKJRemDDpJ2i_iWbCTRMY7KG7DY9UCjc8IWQijO9GQp1EwSaZn0D9tgj1NJQQKAOqEzLNQqG5kdKFeabi2ndFixw1vRLrmqYcT8u4jyuCZT-Gdoux3Vpkfyb5UFFz_CDTbjo2ro1zGnswq_DAszEsYvYYzArXSuTEZAXKgOa4MLtjLXJY9uKv74hH_R5et_8quEMWAHbxKiimTeZtXphdgDZW7ZVK_A5T6PcI
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwEB7R5UA5tDyKui0tRkJwypJkHROrJ4QWLc8DCxIHpMh2HCqBNijrVNqe-iP6C_tLOpPHQhGVqp5iJePE8czYn-3xZ4CtOEyFn5rMs9bGHhdR6CmtiYtQ6wzRnOWSdiOfnYvhFT--jq7n4Eu7F6bmh5hNuJFnVO01OThNSO8-soZOrOkRz-QrmOcChymEiC5m3FHY7ew1S8oUEBTwlnnWD3fbnH_2RY8A8ylMrfqZw7dw05awDi-565VO98z3Z-SN__kLS_CmwZ9svzaYZZiz4xVYfMJKuArpyFAwDqYZokNmKMjTMXR2RkHyt-xrPsY0Wncxrdob5nJWlPeW5aWrcuiidJYhGjaWKeeUuWN5xvYHo18_fio2KYtvdvoOrg4HlwdDrzmMwTOI8PpenCES1EoLIfuIOeJIBVHKVZiSC6eGSz9Lsb9HjVsR6wxvBFKqVNrQj6Xei_tr0Blj-d4DCwy-oa8tWk_EDY-kEVYpH4eaWpjQl13YadWSmIapnA7MuE9qjuUwwXpLqN66sDmTfKjZOV6QWW81mzT-OUkCHFgE2LhxesXsMXoWLZeosc1LkkHT8XGAx7uwXanxr99IRoMDun74V8ENWBhenp0mp0fnJx_hNaIwUcfIrEPHFaX9hEjH6c-VRf8GydH7KQ
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB6VIiE48K5YKGAkBKdsk6zjxuJUtbsqrwqxVOoBKfJjAlKrTZV1kMqJH8Ev5Jcwk8e2IJAQp1iJ7TieGc_nePwZ4GmeehV7V0aImEdSZWlkrGUuQmtLQnMoNe9Gfnug9g_lq6PsaA1eDHthOn6I1Q83tox2vGYDx1Nfbp2zhi7RjZln8hJclpnOOZ5v7_2KO4rczna_pMwBQYkcmGfjdGso-asvOgeYF2Fq62dmN-Dj0MIuvOR43AQ7dl9_I2_8z0-4Cdd7_Cl2OoW5BWu4uA3XLrAS3gE_dxyMQ2lB6FA4DvIMgoxdcJD8J_G5WlCatLs-a8cbESpRNycoqia0JWzdBBSEhh0KE4Jxx6Iqxc50_uPbdyOWTf0Fz-7C4Wz6YXc_6g9jiBwhvEmUl4QErbFK6QlhjjwzSealST2bsHdSx6Unf08SR5Xbkm4kWhuvMY1zbbfzyQasL6h990AkjmqYWCTtyaQj2TmFxsQ01bTKpbEewfNBLIXrmcr5wIyTouNYTgvqt4L7bQRPVjlPO3aOP-TZHCRb9Pa5LBKaWCQ0uEmuYvWYLIuXS8wCq4bzkOrENMGTI3jWivGv7yjm012-3v_XjI_hyru9WfHm5cHrB3CVQJjqQmQ2YT3UDT4koBPso1ahfwJ48Pqt
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Screening+the+covert+key+using+honey+encryption+to+rule+out+the+brute+force+attack+of+AES%E2%80%94a+survey&rft.jtitle=Security+and+communication+networks&rft.au=Dharshini%2C+P&rft.au=Arokia+Renjith%2C+J&rft.au=Mohan+Kumar%2C+P&rft.date=2016-12-01&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=9&rft.issue=18&rft.spage=6379&rft.epage=6385&rft_id=info:doi/10.1002%2Fsec.1753&rft.externalDBID=n%2Fa&rft.externalDocID=10_1002_sec_1753
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon