Screening the covert key using honey encryption to rule out the brute force attack of AES - a survey.
P. DharshiniJ. Arokia RenjithP. Mohan KumarPublished in: Secur. Commun. Networks (2016)
Keyphrases
- brute force
- block cipher
- secret key
- encryption algorithm
- data encryption standard
- secure communication
- private key
- encryption algorithms
- high security
- ciphertext
- s box
- hash functions
- computationally expensive
- encryption scheme
- public key
- search quality
- advanced encryption standard
- encryption decryption
- smart card
- image encryption
- exhaustive search
- information flow
- cryptographic algorithms
- security analysis
- authentication scheme
- locality sensitive hashing
- computer chess
- mathematical model
- search algorithm
- authentication protocol
- key management