Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php on line 451

Warning: Cannot modify header information - headers already sent by (output started at /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php:451) in /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php on line 654

Warning: Cannot modify header information - headers already sent by (output started at /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php:451) in /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php on line 655
TY - JOUR TI - Honey Encryption Techniques: Strengths, Limitations, and Challenges PY - %2025/%08/%25 Y2 - %2025/%12/%22 JF - Al-Mansour Journal JA - مجلة المنصور VL - 42 IS - 1 LA - en KW - Cryptography KW - Honey Encryption KW - Brute Force Attacks KW - Honey Passwords KW - Password-based Encryption UR - https://journal.muc.edu.iq/journal/article/view/669 SP - 12-28 AB - Currently, information security is a difficult issue due to growing information capacity and transmission procedures. One encryption method that can provide security above and beyond the brute-force limit is honey encryption (HE). Ultimately, HE becomes a part of everyday systems.  Most researchers use improved encryption and decryption for HE schemes to improve information security domains since traditional HE has several drawbacks. An overview of current developments in the Honey Encryption scheme will be provided in this article. HE's drawbacks and difficulties are outlined and examined. Specific of the solutions suggested have been introduced.   ER -