Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php on line 451
Warning: Cannot modify header information - headers already sent by (output started at /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php:451) in /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php on line 654
Warning: Cannot modify header information - headers already sent by (output started at /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php:451) in /home2/muc/public_html/journal/plugins/generic/citationStyleLanguage/CitationStyleLanguagePlugin.php on line 655
TY - JOUR
TI - Honey Encryption Techniques: Strengths, Limitations, and Challenges
PY - %2025/%08/%25
Y2 - %2025/%12/%22
JF - Al-Mansour Journal
JA - مجلة المنصور
VL - 42
IS - 1
LA - en
KW - Cryptography
KW - Honey Encryption
KW - Brute Force Attacks
KW - Honey Passwords
KW - Password-based Encryption
UR - https://journal.muc.edu.iq/journal/article/view/669
SP - 12-28
AB - Currently, information security is a difficult issue due to growing information capacity and transmission procedures. One encryption method that can provide security above and beyond the brute-force limit is honey encryption (HE). Ultimately, HE becomes a part of everyday systems. Most researchers use improved encryption and decryption for HE schemes to improve information security domains since traditional HE has several drawbacks. An overview of current developments in the Honey Encryption scheme will be provided in this article. HE's drawbacks and difficulties are outlined and examined. Specific of the solutions suggested have been introduced.
ER -