• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام

عنوان
Improving Data Security with Honey Encryption and Residue Number System

پدید آورنده
Afoluwaso Giwa, Tawakalitu

موضوع
Computer science

رده

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

NATIONAL BIBLIOGRAPHY NUMBER

Number
TLpq2512684619

LANGUAGE OF THE ITEM

.Language of Text, Soundtrack etc
انگلیسی

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Improving Data Security with Honey Encryption and Residue Number System
General Material Designation
[Thesis]
First Statement of Responsibility
Afoluwaso Giwa, Tawakalitu
Subsequent Statement of Responsibility
Gbolagade, Kazeem

.PUBLICATION, DISTRIBUTION, ETC

Name of Publisher, Distributor, etc.
Kwara State University (Nigeria)
Date of Publication, Distribution, etc.
2020

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
92

DISSERTATION (THESIS) NOTE

Dissertation or thesis details and type of degree
M.S.
Body granting the degree
Kwara State University (Nigeria)
Text preceding or following the note
2020

SUMMARY OR ABSTRACT

Text of Note
In everyday life, data is being transmitted, either through offline or online. As technology advances online transmission of data gets more attentions, and as a result unauthorized people try to intrude the privacy of the data being transmitted, hence the security of this data is at stake. Many companies and organizations use various techniques to secure their data before sending it through unsecure network. Attackers try to hack this data using various method like brute-force attack. Different encryption algorithms were used to protect the privacy of the data. However, most of the existing methods are vulnerable to brute-force attack because, the ciphertext remain unintelligible and unmeaningful until original data is found. Consequently, this problem prompted researchers to introduce honey encryption (HE). Honey encryption helps eliminate vulnerability of the encryption algorithms in brute force attacks, so as to make transmitted data more secure and efficient. Though, Honey Encryption eliminate brute force attack completely but, its problem is that, it works only on numeric data. Hybridization of 'HE' with other encryption algorithm like AES (Advanced Encryption Standard) was carried out by some researchers, to also prevent text data from brute force attack which leads to computational problem and slow processing time. The problem of slow processing time make us proposed a hybridized HE with Residue Number System. A particular Moduli Set was used to generate the Key while CRT (Chinese Remainder Theorem) together with HE technique was used for decrypting the data, based on the Distribution Transformation Decoder. When the attacker attempts to access the encrypted data by entering the incorrect key, instead of rejecting the access, the HE algorithm generates an indistinguishable bogus but meaningful data, this helps to deter attacker from trying further. The proposed system was able to eliminate brute force attack and with less processing time compare to other systems. The graph of n-values for the moduli set used was plotted against encryption and decryption time, the message length was also varied and plotted against processing time, a graph was plotted to compare the efficiency of the proposed system to the existing one, and some observations were noted. Comparing the obtained results with the existing hybridized Honey Encryption, the proposed system processing time is faster and more secure because the ciphertext produced is deceiving and to decrypt it, it require lot of efforts like finding the sequence of algorithms used, getting the moduli set used, determine the value of n for the moduli set, knowing the character table and also determining the Distribution Transformation Encoder style of the Honey Encryption.

TOPICAL NAME USED AS SUBJECT

Computer science

PERSONAL NAME - PRIMARY RESPONSIBILITY

Afoluwaso Giwa, Tawakalitu
Gbolagade, Kazeem

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

p

[Thesis]
276903

a
Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival