Screening the covert key using honey encryption to rule out the brute force attack of AES—a survey
Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be sent out via a safe secured channel. The advanced encryption standard (AES) is mentioned as the best standard encryption algorithm by the US...
Saved in:
| Published in | Security and communication networks Vol. 9; no. 18; pp. 6379 - 6385 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
London
John Wiley & Sons, Inc
01.12.2016
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1939-0114 1939-0122 |
| DOI | 10.1002/sec.1753 |
Cover
| Abstract | Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be sent out via a safe secured channel. The advanced encryption standard (AES) is mentioned as the best standard encryption algorithm by the US government, but there is one major attack on the AES that is the brute force attack. So, how to rule out these kinds of attack and how it is implemented effectively in hardware are being discussed in this paper. The honey encryption scheme is an effective algorithm, and it is also being discussed. In this paper, the detailed description of the AES and the methods to improve its speed and how it is integrated with the honey technique have been discussed. The different kinds of attacks and the various solutions are discussed for both of the algorithms. A survey of papers which has used these algorithms for various reasons with different perspective has been given. The honey algorithm creates the fake message for the wrong try of the key puncher. Thus, this is considered as the best algorithm, but it is also has some disadvantages that is also focussed in our survey. Copyright © 2017 John Wiley & Sons, Ltd.
The above diagram shows the general architecture of how the plain text is encrypted with a honey encryption algorithm. The encrypted text is sent to the receiver node in the knowledge of the receiver. The receiver decrypts the cipher text and gets the original text without suffering from any mode of attacks. |
|---|---|
| AbstractList | Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be sent out via a safe secured channel. The advanced encryption standard (AES) is mentioned as the best standard encryption algorithm by the US government, but there is one major attack on the AES that is the brute force attack. So, how to rule out these kinds of attack and how it is implemented effectively in hardware are being discussed in this paper. The honey encryption scheme is an effective algorithm, and it is also being discussed. In this paper, the detailed description of the AES and the methods to improve its speed and how it is integrated with the honey technique have been discussed. The different kinds of attacks and the various solutions are discussed for both of the algorithms. A survey of papers which has used these algorithms for various reasons with different perspective has been given. The honey algorithm creates the fake message for the wrong try of the key puncher. Thus, this is considered as the best algorithm, but it is also has some disadvantages that is also focussed in our survey. Copyright © 2017 John Wiley & Sons, Ltd. Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be sent out via a safe secured channel. The advanced encryption standard (AES) is mentioned as the best standard encryption algorithm by the US government, but there is one major attack on the AES that is the brute force attack. So, how to rule out these kinds of attack and how it is implemented effectively in hardware are being discussed in this paper. The honey encryption scheme is an effective algorithm, and it is also being discussed. In this paper, the detailed description of the AES and the methods to improve its speed and how it is integrated with the honey technique have been discussed. The different kinds of attacks and the various solutions are discussed for both of the algorithms. A survey of papers which has used these algorithms for various reasons with different perspective has been given. The honey algorithm creates the fake message for the wrong try of the key puncher. Thus, this is considered as the best algorithm, but it is also has some disadvantages that is also focussed in our survey. Copyright © 2017 John Wiley & Sons, Ltd. The above diagram shows the general architecture of how the plain text is encrypted with a honey encryption algorithm. The encrypted text is sent to the receiver node in the knowledge of the receiver. The receiver decrypts the cipher text and gets the original text without suffering from any mode of attacks. Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be sent out via a safe secured channel. The advanced encryption standard (AES) is mentioned as the best standard encryption algorithm by the US government, but there is one major attack on the AES that is the brute force attack. So, how to rule out these kinds of attack and how it is implemented effectively in hardware are being discussed in this paper. The honey encryption scheme is an effective algorithm, and it is also being discussed. In this paper, the detailed description of the AES and the methods to improve its speed and how it is integrated with the honey technique have been discussed. The different kinds of attacks and the various solutions are discussed for both of the algorithms. A survey of papers which has used these algorithms for various reasons with different perspective has been given. The honey algorithm creates the fake message for the wrong try of the key puncher. Thus, this is considered as the best algorithm, but it is also has some disadvantages that is also focussed in our survey. The above diagram shows the general architecture of how the plain text is encrypted with a honey encryption algorithm. The encrypted text is sent to the receiver node in the knowledge of the receiver. The receiver decrypts the cipher text and gets the original text without suffering from any mode of attacks. |
| Author | Mohan Kumar, P Arokia Renjith, J Dharshini, P |
| Author_xml | – sequence: 1 givenname: P surname: Dharshini fullname: Dharshini, P organization: Department of CSE – sequence: 2 givenname: J surname: Arokia Renjith fullname: Arokia Renjith, J organization: Department of CSE – sequence: 3 givenname: P surname: Mohan Kumar fullname: Mohan Kumar, P email: mohankumarmohan@gmail.com organization: Department of CSE |
| BookMark | eNp1kMtKw0AUhgepYFsFH2HAjZvUuaTJzLKUeoGCi-o6TCYnNm2aqTOTSnY-hE_ok5i0olB0dQ6H7_85fAPUq0wFCF1SMqKEsBsHekTjMT9BfSq5DAhlrPez0_AMDZxbERLRMA77KFtoC1AV1Qv2S8Da7MB6vIYG1647Ltv2BkOlbbP1hamwN9jWJWBT-30itbUHnBurASvvlV5jk-PJbPH5_qGwq-0OmnN0mqvSwcX3HKLn29nT9D6YP949TCfzQHMW8UDkjNNUpVEkOaexGCs6zkLFMiojnulQkjwjLAQQEIk0bw9USpVJYETINBZ8iK4PvVtrXmtwPtkUTkNZqgpM7RIqWgskIlHYoldH6MrUtmq_aynBaMxJyH8LtTXOWciTrS02yjYJJUmnO2l1J53uFh0dobrwqlPmrSrKvwLBIfBWlND8W5wsZtM9_wXZ6ZJ5 |
| CitedBy_id | crossref_primary_10_1007_s12083_021_01175_6 |
| Cites_doi | 10.1109/PERVASIVE.2015.7087102 10.1109/SP.2015.36 10.1080/19361610.2014.883295 10.1109/DSD.2006.40 10.1145/2756601.2756606 10.1145/2508859.2516671 10.1109/ICNM.2009.4907203 10.1080/19361610.2013.825753 10.1109/SMC.2014.6974088 10.1109/TIFS.2014.2383359 |
| ContentType | Journal Article |
| Copyright | Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd. |
| Copyright_xml | – notice: Copyright © 2017 John Wiley & Sons, Ltd. – notice: Copyright © 2016 John Wiley & Sons, Ltd. |
| DBID | AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1002/sec.1753 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database CrossRef Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1939-0122 |
| EndPage | 6385 |
| ExternalDocumentID | 4321295911 10_1002_sec_1753 SEC1753 |
| Genre | reviewArticle |
| GroupedDBID | .4S .DC 05W 0R~ 123 1OC 24P 31~ 3SF 4.4 52U 5DZ 66C 8-1 8UM AAESR AAEVG AAFWJ AAJEY AANHP AAONW AAZKR ACBWZ ACCMX ACGFO ACRPL ACXQS ACYXJ ADBBV ADIZJ ADNMO AEIMD AENEX AFBPY AFKRA AJXKR ALMA_UNASSIGNED_HOLDINGS AMBMR ARAPS ARCSS ASPBG ATUGU AVWKF AZFZN AZVAB BCNDV BDRZF BENPR BGLVJ BHBCM BNHUX BOGZA BRXPI CCPQU CS3 DR2 DU5 EBS EIS EJD F1Z FEDTE G-S GODZA GROUPED_DOAJ H13 HCIFZ HVGLF HZ~ IAO ICD IX1 K7- LH4 LITHE LW6 MY. MY~ NNB O9- OIG OK1 P2P PIMPY RHX ROL SUPJJ TH9 TUS W99 WBKPD XV2 AAMMB AAYXX ADMLS AEFGJ AGQPQ AGXDD AIDQK AIDYY CITATION PUEGO 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c3263-8f231bab669331785a15d4a2d1963dc490fd024ee8e68bfc49199ad9e2089b783 |
| IEDL.DBID | DR2 |
| ISSN | 1939-0114 |
| IngestDate | Thu Sep 04 15:48:41 EDT 2025 Mon Sep 08 09:43:13 EDT 2025 Wed Oct 01 02:25:56 EDT 2025 Thu Apr 24 23:05:23 EDT 2025 Wed Jan 22 16:46:32 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 18 |
| Language | English |
| License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c3263-8f231bab669331785a15d4a2d1963dc490fd024ee8e68bfc49199ad9e2089b783 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| PQID | 1882173043 |
| PQPubID | 1046363 |
| PageCount | 7 |
| ParticipantIDs | proquest_miscellaneous_1893906064 proquest_journals_1882173043 crossref_primary_10_1002_sec_1753 crossref_citationtrail_10_1002_sec_1753 wiley_primary_10_1002_sec_1753_SEC1753 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | December 2016 2016-12-00 20161201 |
| PublicationDateYYYYMMDD | 2016-12-01 |
| PublicationDate_xml | – month: 12 year: 2016 text: December 2016 |
| PublicationDecade | 2010 |
| PublicationPlace | London |
| PublicationPlace_xml | – name: London |
| PublicationTitle | Security and communication networks |
| PublicationYear | 2016 |
| Publisher | John Wiley & Sons, Inc |
| Publisher_xml | – name: John Wiley & Sons, Inc |
| References | 2009 2006 2015 2014 2013 2002 2014; 9 2011 2013; 8 2010 2006; 55 2014; 12 e_1_2_7_6_1 e_1_2_7_5_1 e_1_2_7_4_1 e_1_2_7_3_1 e_1_2_7_9_1 e_1_2_7_8_1 e_1_2_7_19_1 e_1_2_7_18_1 e_1_2_7_17_1 e_1_2_7_16_1 e_1_2_7_2_1 Chih‐Hsu Yen Bing‐Fei W (e_1_2_7_7_1) 2006; 55 e_1_2_7_15_1 e_1_2_7_14_1 e_1_2_7_13_1 e_1_2_7_12_1 e_1_2_7_11_1 e_1_2_7_10_1 Aris Juels A (e_1_2_7_20_1) 2014; 12 |
| References_xml | – year: 2011 – year: 2009 – volume: 12 issue: 4 year: 2014 article-title: Honey encryption: encryption beyond the brute‐force barrier. Security & Privacy publication-title: IEEE – volume: 9 start-page: 172 issue: 2 year: 2014 end-page: 184 article-title: Encryption‐based secure sharing of data with fine‐grained access control in public clouds publication-title: Journal of Applied Security Research – year: 2014 – year: 2002 – volume: 8 start-page: 467 issue: 4 year: 2013 end-page: 476 article-title: Dynamic programming based encrypted reversible data hiding in images publication-title: Journal of Applied Security Research – year: 2015 – volume: 55 issue: 6 year: 2006 article-title: Simple error detection methods for hardware implementation of Advanced Encryption Standard publication-title: Computers, IEEE Transactions on – year: 2010 – year: 2006 – year: 2013 – ident: e_1_2_7_8_1 – ident: e_1_2_7_12_1 doi: 10.1109/PERVASIVE.2015.7087102 – ident: e_1_2_7_2_1 – ident: e_1_2_7_6_1 doi: 10.1109/SP.2015.36 – ident: e_1_2_7_13_1 – ident: e_1_2_7_18_1 doi: 10.1080/19361610.2014.883295 – ident: e_1_2_7_14_1 – ident: e_1_2_7_3_1 – ident: e_1_2_7_10_1 doi: 10.1109/DSD.2006.40 – ident: e_1_2_7_19_1 – ident: e_1_2_7_11_1 doi: 10.1145/2756601.2756606 – volume: 12 issue: 4 year: 2014 ident: e_1_2_7_20_1 article-title: Honey encryption: encryption beyond the brute‐force barrier. Security & Privacy publication-title: IEEE – ident: e_1_2_7_4_1 doi: 10.1145/2508859.2516671 – ident: e_1_2_7_9_1 doi: 10.1109/ICNM.2009.4907203 – volume: 55 issue: 6 year: 2006 ident: e_1_2_7_7_1 article-title: Simple error detection methods for hardware implementation of Advanced Encryption Standard publication-title: Computers, IEEE Transactions on – ident: e_1_2_7_17_1 doi: 10.1080/19361610.2013.825753 – ident: e_1_2_7_5_1 doi: 10.1109/SMC.2014.6974088 – ident: e_1_2_7_15_1 – ident: e_1_2_7_16_1 doi: 10.1109/TIFS.2014.2383359 |
| SSID | ssj0061474 |
| Score | 2.0369182 |
| SecondaryResourceType | review_article |
| Snippet | Recently, the major challenging attack is the side channel attack for both symmetric and asymmetric algorithm. Because in both cases, the secret key has to be... |
| SourceID | proquest crossref wiley |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 6379 |
| SubjectTerms | AES encryption Algorithms brute force attack Channels Communication networks Encryption Honey honey encryption Receivers Texts |
| Title | Screening the covert key using honey encryption to rule out the brute force attack of AES—a survey |
| URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fsec.1753 https://www.proquest.com/docview/1882173043 https://www.proquest.com/docview/1893906064 |
| Volume | 9 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 issn: 1939-0114 databaseCode: ADMLS dateStart: 20110501 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVWIB databaseName: Wiley Online Library - Core collection (SURFmarket) issn: 1939-0114 databaseCode: DR2 dateStart: 20070101 customDbUrl: isFulltext: true eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 providerName: Wiley-Blackwell |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA7iSQ--xdVVIoieuvaRxua4LLssgh5cFwQPJUlTBWUr3VTQkz_CX-gvcaaP9YGCeGpoJ2mazEy-NJMvhBxEfsLdRKeOMSZyGA99RyqFXIRKpYDmDBO4G_nsnA_H7PQqvKqjKnEvTMUPMfvhhpZR-ms0cKmmxx-koVOjO0gzCe7XC3g5m7qYMUfBoHNSLyhjOJDHGt5Z1z9uMn4diT7g5WeQWo4yg2Vy3dSvCi656xRWdfTzN-rG_33AClmqwSftVtqySubMZI0sfqIkXCfJSGMkDqQpQEOqMcLTUrB0ihHyN_Q2m0AaVDt_Kp0NtRnNi3tDs8KWOVReWEMBCmtDpbVS39Espd3-6O3lVdJpkT-apw0yHvQve0OnPonB0QDvAidKAQYqqTgXAQCOKJRemDDpJ2i_iWbCTRMY7KG7DY9UCjc8IWQijO9GQp1EwSaZn0D9tgj1NJQQKAOqEzLNQqG5kdKFeabi2ndFixw1vRLrmqYcT8u4jyuCZT-Gdoux3Vpkfyb5UFFz_CDTbjo2ro1zGnswq_DAszEsYvYYzArXSuTEZAXKgOa4MLtjLXJY9uKv74hH_R5et_8quEMWAHbxKiimTeZtXphdgDZW7ZVK_A5T6PcI |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwEB7R5UA5tDyKui0tRkJwypJkHROrJ4QWLc8DCxIHpMh2HCqBNijrVNqe-iP6C_tLOpPHQhGVqp5iJePE8czYn-3xZ4CtOEyFn5rMs9bGHhdR6CmtiYtQ6wzRnOWSdiOfnYvhFT--jq7n4Eu7F6bmh5hNuJFnVO01OThNSO8-soZOrOkRz-QrmOcChymEiC5m3FHY7ew1S8oUEBTwlnnWD3fbnH_2RY8A8ylMrfqZw7dw05awDi-565VO98z3Z-SN__kLS_CmwZ9svzaYZZiz4xVYfMJKuArpyFAwDqYZokNmKMjTMXR2RkHyt-xrPsY0Wncxrdob5nJWlPeW5aWrcuiidJYhGjaWKeeUuWN5xvYHo18_fio2KYtvdvoOrg4HlwdDrzmMwTOI8PpenCES1EoLIfuIOeJIBVHKVZiSC6eGSz9Lsb9HjVsR6wxvBFKqVNrQj6Xei_tr0Blj-d4DCwy-oa8tWk_EDY-kEVYpH4eaWpjQl13YadWSmIapnA7MuE9qjuUwwXpLqN66sDmTfKjZOV6QWW81mzT-OUkCHFgE2LhxesXsMXoWLZeosc1LkkHT8XGAx7uwXanxr99IRoMDun74V8ENWBhenp0mp0fnJx_hNaIwUcfIrEPHFaX9hEjH6c-VRf8GydH7KQ |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB6VIiE48K5YKGAkBKdsk6zjxuJUtbsqrwqxVOoBKfJjAlKrTZV1kMqJH8Ev5Jcwk8e2IJAQp1iJ7TieGc_nePwZ4GmeehV7V0aImEdSZWlkrGUuQmtLQnMoNe9Gfnug9g_lq6PsaA1eDHthOn6I1Q83tox2vGYDx1Nfbp2zhi7RjZln8hJclpnOOZ5v7_2KO4rczna_pMwBQYkcmGfjdGso-asvOgeYF2Fq62dmN-Dj0MIuvOR43AQ7dl9_I2_8z0-4Cdd7_Cl2OoW5BWu4uA3XLrAS3gE_dxyMQ2lB6FA4DvIMgoxdcJD8J_G5WlCatLs-a8cbESpRNycoqia0JWzdBBSEhh0KE4Jxx6Iqxc50_uPbdyOWTf0Fz-7C4Wz6YXc_6g9jiBwhvEmUl4QErbFK6QlhjjwzSealST2bsHdSx6Unf08SR5Xbkm4kWhuvMY1zbbfzyQasL6h990AkjmqYWCTtyaQj2TmFxsQ01bTKpbEewfNBLIXrmcr5wIyTouNYTgvqt4L7bQRPVjlPO3aOP-TZHCRb9Pa5LBKaWCQ0uEmuYvWYLIuXS8wCq4bzkOrENMGTI3jWivGv7yjm012-3v_XjI_hyru9WfHm5cHrB3CVQJjqQmQ2YT3UDT4koBPso1ahfwJ48Pqt |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Screening+the+covert+key+using+honey+encryption+to+rule+out+the+brute+force+attack+of+AES%E2%80%94a+survey&rft.jtitle=Security+and+communication+networks&rft.au=Dharshini%2C+P&rft.au=Arokia+Renjith%2C+J&rft.au=Mohan+Kumar%2C+P&rft.date=2016-12-01&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=9&rft.issue=18&rft.spage=6379&rft.epage=6385&rft_id=info:doi/10.1002%2Fsec.1753&rft.externalDBID=n%2Fa&rft.externalDocID=10_1002_sec_1753 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon |