Honey Encryption Techniques: Strengths, Limitations, and Challenges

Authors

  • Nidaa Flaih Hassan Nidaa Flaih Hassan
  • هاله بهجت عبدالوهاب هاله بهجت عبدالوهاب
  • اياد حازم ابراهيم اياد حازم ابراهيم
  • رحاب فليح حسن رحاب فليح حسن

Keywords:

Cryptography, Honey Encryption, Brute Force Attacks, Honey Passwords, Password-based Encryption

Abstract

Currently, information security is a difficult issue due to growing information capacity and transmission procedures. One encryption method that can provide security above and beyond the brute-force limit is honey encryption (HE). Ultimately, HE becomes a part of everyday systems.  Most researchers use improved encryption and decryption for HE schemes to improve information security domains since traditional HE has several drawbacks. An overview of current developments in the Honey Encryption scheme will be provided in this article. HE's drawbacks and difficulties are outlined and examined. Specific of the solutions suggested have been introduced.

 

 

Downloads

Published

08/25/2025

Issue

Section

Articles

How to Cite

Honey Encryption Techniques: Strengths, Limitations, and Challenges . (2025). Al-Mansour Journal, 42(1), 1-17. https://journal.muc.edu.iq/journal/article/view/669