SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1019
Securing Messages from Brute Force Attack by Combined Approach of
Honey Encryption and Blowfish
Rasmita Sahu1, Mohd. Shajid Ansari2
1MTech Scholar, Department of Computer Science & Engineering, RSR-RCET, Bhilai, Chhattisgarh, India
2Assistant Professor, HOD, Department of Computer Science & Engineering, RSR-RCET, Bhilai, Chhattisgarh, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -Nowadays, Messagingserviceisbeing usedinmany
daily life applications like banking, business processes, mobile
commerce, and so on. Mostly the current messaging based
transactions use traditional encryption for security of the
message. But the message may be hacked easily by the brute
force attacker when he/she guess the key. Encryption also
poses a threat as if key is hacked then the message could be
intercepted during transmission. Theproposedapproachaims
to develop a secure messaging transmission scheme that uses
Honey Encryption technique for preventing the text based
messages from brute face attacks in order to make messaging
communication more secure and efficient. In this research
paper we present a secure framework for messaging in
android based device by using Honey Encryption with an
efficient symmetric keyencryptionalgorithm. Wealsoperform
a comparative analysis between the HoneyEncodingwithAES
and Honey encoding with Blowfish algorithm. Experiments
show that the Honey Encryption produce best result with
Blowfish as compared to AES because Blowfish takes less
processing time.
Keywords-Messaging, Brute forceAttack,HoneyEncryption,
AES, Blowfish
I. INTRODUCTION
The popularity of messaging services is increasing day by
day as it is being used in many data centric applications
including railways enquiry, news alert, mobile banking, and
health care applications.Usersendsconfidential information
using messaging services. The contents of messaging are
stored in messaging centre and it is visible to the network
provider Staff it can modify he contain of the message and
therefore, Messaging is not an appropriate communication
medium for secure communications. A hacker can easily
hack the messaging centre and read the message contain.
People send confidential information through the SMS so
security is needed.
For providing security mostly encryption technique is used
by which the message is converted into an unreadable
format known as cipher text. But still the encryption is
weaker because brute force attacker [2]hack messageeasily
if he find the key through some hacking methods. The
security totally depends upon the key sizeandqualityofkey.
If the key length is n bit then there is a possibility of
generating 2n possible keys [1]. So the attacker needs to try
264 possible operations for cracking 64 bit key.
II. EXISTING SYSTEM
In the existing system the message security is provided by
the conventional cryptographic algorithms like symmetric
key and asymmetric key. The conventional Password Based
Encryption algorithm[1]providesa singlelayersecuritythat
is the message is encrypted by shared secret key at sender
side and produces a cipher text. The cipher text is in
unreadable format and it travels through the network. So in
this case there is a chance of happening Brute force attack
with the cipher text, because the attacker tries to hack the
message by trying all the possibility of keys to decrypt the
message. If he gets the password then he can easily hack the
message. In the reference paper [1] , the authors provides a
best Encryption technique known as Honey Encryption
which provides security against the Brute force attack. The
research paper presents a messaging system for a desktop
based application usingHoneyEncryptionscheme.Weknow
HE is two step approach, so at first step the authors of paper
[1] implement DTE by the Statistical coding scheme and at
step two they propose a symmetric key algorithm AES to
encrypt the encoded message. So we need an improved
framework for Honey encryption for messaging services,
which is proposed in our research work.
III. PROBLEM IDENTIFICATION
The major Issues identified from the traditional approaches
are:
1. The Present AES encryption technique employedin
Honey encryption needs more Processing plus it
demands more rounds of communicating.
2. Present approach is implemented on desktop
computer. Today for messaging people prefer
Android based devices so we need a messaging
application with HE which can execute on Android
based devices
3. DTE is the core of Honey Encryption. So the good
quality of DTE design for messaging application is a
very challenging task because for every plain
message the DTE should generate a meaningful
output message so that the attacker get confuse.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1020
IV. PROPOSED ALGORITHMS
A. Honey Encryption
Honey encryption (HE) is a simple Method of encrypting
messages using Non min-entropy keys for example
passwords. He's intended to produce a cipher text which,
when decrypted with any of a number of keys that were
incorrect, yields plausible appearing but bogus plaintexts
called honey messages. Honey Encryption [2] turns each
wrong password guess made by a hacker to a perplexing
dead-end. When an application or user sends and enters a
password key to get an encrypted database or database, so
long as the password is correct, the data is encrypted and
accessible in its original, and readable, format. In case the
password key is incorrect the data will last to be encrypted
and invisibly. Hackers who steal databasesofuserloginsand
passwords simply need to guess just one correct password
to be able to get access to the data [2]. How that they
understand they have the right password is as soon as the
database or file becomes readable. By way of example, if a
hacker created 100 password attempts, they would get 100
plain text success. Even if one of the passwordswerecorrect,
the real data would be equal from the bogus data.
Honey Encryption is broadly two step process, in first step
DTE (Distribution Transforming Encoding) is happen with
the input data then in second step SE (Symmetric
Encryption) is happen to encrypt the encoded data. The
following diagram shows the overall process of Honey
Encryption Scheme.
Figure-1: Honey Encryption Process
Where the following table present the symbos detail in the
figure1
Table-1: HE Symbols
M Message
S Seed
C Cipher text
K Key
DTEncoder Discrete Transforming Encoder
DTDecoder Discrete Transforming Decoder
B. AES Algorithm
The Popular and widely adopted symmetric encryption
algorithm likely to be encountered nowadays is the
Advanced Encryption Standard (AES). It's found at least six
times faster than algorithms like triple DES. AES comprises
three block ciphers: AES-128, AES-192 and AES-256. Each
cipher encrypts and decrypts data in blocks of128bitsusing
cryptographic keys of 128-, 192- and 256-bits, respectively.
First the plain text block is put into an array then the data is
processed in no of rounds repeatedly to change its original
meaning. The number of rounds is depends upon the key
size. For the key length 128 bit it takes 10 rounds,forthekey
length 192 bit it takes 12 rounds and for key length 256bitit
takes 14 rounds.[10]
C. Blowfish Algorithm
Blowfish is a symmetric block cipher developed by Bruce
Schneier in 1993.It is a fastest algorithm can be Utilized as a
drop-in replacement for DES or IDEA. Blowfish takes 64 bit
input block of message to encrypt and requires a variable-
length key, from 32 bits to 448 bits, which makes it ideal for
both domestic and exportable use [8]. Ever since that time it
has been analyzed considerably, and it's slowly gaining
acceptance as a strong encryption algorithm. Blowfish is
unpatented and license-free, and is available free for all
applications. Blowfish is a Feistel network algorithm
employed (Feistel Network), which consists of 16 rounds
[10]. In this paper we combine this algorithm with Honey
Encoding for the best performance of message security.
V. PROPOSED METHODOLOGY
The methodology will consist of following phases:-
1. At sender side first Encode message with Honey
Encoding and generate encoded text.
2. Encrypt the encoded output with Symmetric key
algorithm and key to generate cipher text.
3. At receiver side decrypt the cipher text with
decryption algorithm and with samekeytoproduce
the encoded text.
4. Then the encoded text is decoded with Honey
Decoding to produce the original message.
5. Then calculate overall processing time
The above 5 steps are perform 2 times. First time with AES
and second time with Blowfish and thencomparetheoverall
processing time in both the cases to find which encryption
algorithm is best with Honey Encoding, whether it is AES or
Blowfish.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1021
5.1 Overall process of proposed algorithm
The following block diagram show the detailed steps of the
proposed messaging systemusingHoneyEncodingwithAES.
Figure -2: Proposed HE with AES
Similar to the above diagram, The following Block diagram
also show the detailed steps of the proposed system using
Honey Encoding with Blowfish algorithm. Here also the
overall processing time for HE _ Encoding, Blowfish _
Encryption, HE _ Decoding and Blowfish _ Decryption is
calculated to compare the time taken by AES with HE.
Figure-3: Proposed HE with Blowfish
In the above two process in figure 1 and figure 2 the
processing time are calculated at each case. We compare the
processing timeconsumed byAESwithHEandBlowfishwith
HE. Here the Blowfish algorithm takes less time as compare
to AES. We implement this in our experiment bellow.
VI. IMPLEMENTATION AND RESULT ANALYSIS
In this section we implement the proposed methodology in
Android studio by developing a simulated messaging
application and the language used is java.
Simulation Environment:
The simulation usesthesuppliedclassesinjava environment
to mimic the operation of AES and Blowfish. The
implementation uses managed wrappers for AES and
Blowfish available in java .cypto and java. Security [Crypto
Spec] that wraps unmanaged Implementations available in
JCE (Java CryptographyExtension)&JCA(Java Cryptography
Architecture).
The Cipher class provide the functionalityofa cryptographic
cipher used for encryption and decryption. It forms the core
of the JCE framework.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1022
Overall Performance with Honey Encryption:
The comparative analysis of working time among the
algorithms with Honey Encryption is as given below.
Figure-4: The Simulated Result in Android Environment
Comparative Analysis of AES and Blowfish with HE
Performance Results using ECB and CBC Mode:
To select any one encryption technique between AES and
Blowfish, which is good for the Honey encoding we have to
compare them according to their performance. The
experiments were conducted using ECB and CBC mode with
AES and Blowfish, the results are shown in figure 1 and
Table 1 below.
Table-2: Performance of AES and Blowfish with modes
Techniques AES
ECB
mode
Blowfish
ECB
mode
AES
CBC
mode
Blowfish
CBC
mode
Time in
Milliseconds
120 10 110 10
Figure-5: Performance graph of AES and Blowfish with
ECB and CBC mode
The result shows the excellence of Blowfish algorithm as
compare to AES in terms of the processing time. It shows
also that AES consumes more processing time with its ECB
and CBC mode than Blowfish. So it is a good decision to
choose Blowfish with Honey Encoding to save time and
provide security.
Table-2: Overall Execution time
Techniques HE with AES HE with
Blowfish
Time taken in
Milliseconds for
a message
250 2
The experiment conducted shows the behavior patterns
according to execution time. The above execution time
reading clearly shows that the proposed approach Honey
Encryption with Blowfish has less execution time as
compared to HE with AES.
Figure-5: Overall Execution Time Chart
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1023
The above line chart show the timetaken byHoneyencoding
with AES and Honey Encoding with Blowfish to encrypt and
decrypt a single message. The HE with AES takes 250
milliseconds, while the HE with Blowfish takes only 2
milliseconds to performEncoding,Encryption,Decoding and
Decryption for a single message.
Figure-6: Messaging Screen
VII. CONCLUSION
The secure framework is successfully designed to provide
security against Brute force attack with Honey encryption.
For android based devices it is essentially needed that the
messages must be send or receive quickly so we need an
encryption algorithm which takes less time and secure to
encrypt as compare to other, so Blowfish encryption
algorithm is the good choice to integrate with Honey
encoding. Because it takes less processing time as compare
to AES. In future more secure framework can be developed
by Incorporating Handshaking techniques for end to end
empowerment between sender and receiver. Also we can
apply the honey encryption with Blowfish in cloud
computing security in future.
REFERENCES
[1] Joo-Im Kim and Ji Won Yoon, “Honey chatting: a
novel instant messaging system Robust to
eavesdropping over communication,” ICASSP,IEEE
2016
[2] Ari Juels, Thomas Ristenpart, “Honey Encryption
Encryption Beyond the Brute-Force Barrier,”
Copublished by the IEEE Computer and Reliability
Societies , 2014
[3] N. Tyagi, J. Wang, K. Wen, and D. Zuo. “Honey
encryption applications.,” Network Security, 2015.
[4] Hoyul Choi, Hyunjae Nam, Junbeom Hur,”Password
Typos Resilience in Honey Encryption,”
International Conference on Information
Networking, IEEE 2017
[5] Amir Emad Ghassami, Daniel Cullina, and Negar
Kiyavash, “Message Partitioning and Limited
Auxiliary Randomness: Alternatives to Honey
Encryption,”IEEE International Symposium on
Information Theory, 2016
[6] Ari Juels, Thomas Ristenpart , “Honey Encryption:
Security Beyond the Brute-Force Bound ,“
EUROCRYPT 2014
[7] Neetesh Saxena ,Narendra S. Chaudhary“EasySMS:
A Protocol For End-to-End Secure Trans-missionOf
SMS” IEEE Transactions OnInformation Forensics
And Security, Vol. 9, No. 7,July 2014
[8] Muhammad Kamran Asif, Yahya Subhi Al-Harthi,
“Intrusion Detection System using Honey Token
based Encrypted Pointers to MitigateCyberThreats
for Critical Infrastructure Networks,” International
Conference on Systems, Man, and Cybernetics,IEEE
2014
[9] Sourabh Chandra, Smita Paira ,” A comparative
survey of symmetric and asymmetric key
cryptography,” International Conference on
Electronics, Communication and Computational
Engineering (ICECCE), IEEE 2014
[10] G. Sowmya, D.Jamuna, M.Venkatakrishna
Reddy, “Blocking of Brute Force Attack”,
International Journal of Engineering Research &
Technology(IJERT), ISSN:2278-0181 Vol. 1 Issue 6,
August-2012
[11] P. Princy “A Comparison Of Symmetric Key
Algorithms DES, AES, BLOWFISH, RC4, RC6: A
Survey” International Journal of Computer Science
& Engineering Technology ISSN : 2229-3345 Vol. 6
No. 05 May 2015
[12] Priyanka Chouhan, Rajendra Singh,”
Security Attacks on Cloud Computing With Possible
Solution”, International Journal of Advanced
Research in Computer Science and Software
Engineering, Volume 6, Issue 1, January 2016
[13] Varsha S.Bari1,Nileema R.Ghuge,ChaitaliC.
Wagh,Sayali R. Sonawane ,Mr.M.B. Gawali“, SMS
Encryption on Android Message Application”,
IJARIIE-ISSN (O)-2395-4396 Vol-2 Issue-2 2016.

More Related Content

PDF
An Enhanced Encryption Technique using BCD and Bit Complementation
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Analysis of Cryptographic Algorithms for Network Security
PDF
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
PDF
Design of Hybrid Cryptography Algorithm for Secure Communication
PDF
DES- Data Encryption Standard
PDF
Prevention of Cheating Message based on Block Cipher using Digital Envelope
PDF
Comparative study of private and public key cryptography algorithms a survey
An Enhanced Encryption Technique using BCD and Bit Complementation
International Journal of Engineering Research and Development (IJERD)
Analysis of Cryptographic Algorithms for Network Security
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
Design of Hybrid Cryptography Algorithm for Secure Communication
DES- Data Encryption Standard
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Comparative study of private and public key cryptography algorithms a survey

What's hot (20)

PDF
Network security unit 1,2,3
PDF
Ntewrok secuirty cs1
PDF
Securing Mobile Data using Cryptography
PDF
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
PDF
Mj3422172221
PDF
N45028390
PDF
Performance Comparison of File Security System using TEA and Blowfish Algorithms
PDF
Securing Database Passwords Using a Combination of hashing and Salting Techni...
PDF
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
PDF
Study of Various Techniques to Filter Spam Emails
PDF
Unlimited Length Random Passwords for Exponentially Increased Security
PDF
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
PDF
Internet Protocol Security as the Network Cryptography System
PDF
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
PDF
Email Encryption using Tri-Cryptosystem Based on Android
PDF
Skyriver Communications – Fixed Wireless Security
PDF
IRJET- Message Encryption using Hybrid Cryptography
PDF
Jo3417381741
PDF
Modified honey encryption scheme for encoding natural language message
Network security unit 1,2,3
Ntewrok secuirty cs1
Securing Mobile Data using Cryptography
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
Mj3422172221
N45028390
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Securing Database Passwords Using a Combination of hashing and Salting Techni...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Study of Various Techniques to Filter Spam Emails
Unlimited Length Random Passwords for Exponentially Increased Security
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Internet Protocol Security as the Network Cryptography System
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Email Encryption using Tri-Cryptosystem Based on Android
Skyriver Communications – Fixed Wireless Security
IRJET- Message Encryption using Hybrid Cryptography
Jo3417381741
Modified honey encryption scheme for encoding natural language message
Ad

Similar to Securing Messages from Brute Force Attack by Combined Approach of Honey Encryption and Blowfish (20)

PDF
J017667582
PDF
IRJET- Comparative Analysis of Encryption Techniques
PDF
A Survey On The Cryptographic Encryption Algorithms
PDF
A Study On Cryptographic Techniques
PDF
A Review on Various Most Common Symmetric Encryptions Algorithms
PDF
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
PDF
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
PDF
L017136269
PDF
Comparison of Various Encryption Algorithms and Techniques for improving secu...
PDF
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
PDF
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
PDF
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
PDF
Literature Survey: Secure transmitting of data using RSA public key implement...
PDF
Ijetcas14 355
PDF
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
PDF
International Refereed Journal of Engineering and Science (IRJES)
PDF
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
PDF
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
PDF
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
PDF
A Survey on Cryptographic Techniques for Network Security.pdf
J017667582
IRJET- Comparative Analysis of Encryption Techniques
A Survey On The Cryptographic Encryption Algorithms
A Study On Cryptographic Techniques
A Review on Various Most Common Symmetric Encryptions Algorithms
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
L017136269
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
Literature Survey: Secure transmitting of data using RSA public key implement...
Ijetcas14 355
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
International Refereed Journal of Engineering and Science (IRJES)
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
A Survey on Cryptographic Techniques for Network Security.pdf
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
Geodesy 1.pptx...............................................
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPT
Project quality management in manufacturing
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
PPT on Performance Review to get promotions
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
web development for engineering and engineering
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Model Code of Practice - Construction Work - 21102022 .pdf
CH1 Production IntroductoryConcepts.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Geodesy 1.pptx...............................................
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Project quality management in manufacturing
bas. eng. economics group 4 presentation 1.pptx
Lecture Notes Electrical Wiring System Components
CYBER-CRIMES AND SECURITY A guide to understanding
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPT on Performance Review to get promotions
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
web development for engineering and engineering
Mechanical Engineering MATERIALS Selection
Foundation to blockchain - A guide to Blockchain Tech
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...

Securing Messages from Brute Force Attack by Combined Approach of Honey Encryption and Blowfish

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1019 Securing Messages from Brute Force Attack by Combined Approach of Honey Encryption and Blowfish Rasmita Sahu1, Mohd. Shajid Ansari2 1MTech Scholar, Department of Computer Science & Engineering, RSR-RCET, Bhilai, Chhattisgarh, India 2Assistant Professor, HOD, Department of Computer Science & Engineering, RSR-RCET, Bhilai, Chhattisgarh, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -Nowadays, Messagingserviceisbeing usedinmany daily life applications like banking, business processes, mobile commerce, and so on. Mostly the current messaging based transactions use traditional encryption for security of the message. But the message may be hacked easily by the brute force attacker when he/she guess the key. Encryption also poses a threat as if key is hacked then the message could be intercepted during transmission. Theproposedapproachaims to develop a secure messaging transmission scheme that uses Honey Encryption technique for preventing the text based messages from brute face attacks in order to make messaging communication more secure and efficient. In this research paper we present a secure framework for messaging in android based device by using Honey Encryption with an efficient symmetric keyencryptionalgorithm. Wealsoperform a comparative analysis between the HoneyEncodingwithAES and Honey encoding with Blowfish algorithm. Experiments show that the Honey Encryption produce best result with Blowfish as compared to AES because Blowfish takes less processing time. Keywords-Messaging, Brute forceAttack,HoneyEncryption, AES, Blowfish I. INTRODUCTION The popularity of messaging services is increasing day by day as it is being used in many data centric applications including railways enquiry, news alert, mobile banking, and health care applications.Usersendsconfidential information using messaging services. The contents of messaging are stored in messaging centre and it is visible to the network provider Staff it can modify he contain of the message and therefore, Messaging is not an appropriate communication medium for secure communications. A hacker can easily hack the messaging centre and read the message contain. People send confidential information through the SMS so security is needed. For providing security mostly encryption technique is used by which the message is converted into an unreadable format known as cipher text. But still the encryption is weaker because brute force attacker [2]hack messageeasily if he find the key through some hacking methods. The security totally depends upon the key sizeandqualityofkey. If the key length is n bit then there is a possibility of generating 2n possible keys [1]. So the attacker needs to try 264 possible operations for cracking 64 bit key. II. EXISTING SYSTEM In the existing system the message security is provided by the conventional cryptographic algorithms like symmetric key and asymmetric key. The conventional Password Based Encryption algorithm[1]providesa singlelayersecuritythat is the message is encrypted by shared secret key at sender side and produces a cipher text. The cipher text is in unreadable format and it travels through the network. So in this case there is a chance of happening Brute force attack with the cipher text, because the attacker tries to hack the message by trying all the possibility of keys to decrypt the message. If he gets the password then he can easily hack the message. In the reference paper [1] , the authors provides a best Encryption technique known as Honey Encryption which provides security against the Brute force attack. The research paper presents a messaging system for a desktop based application usingHoneyEncryptionscheme.Weknow HE is two step approach, so at first step the authors of paper [1] implement DTE by the Statistical coding scheme and at step two they propose a symmetric key algorithm AES to encrypt the encoded message. So we need an improved framework for Honey encryption for messaging services, which is proposed in our research work. III. PROBLEM IDENTIFICATION The major Issues identified from the traditional approaches are: 1. The Present AES encryption technique employedin Honey encryption needs more Processing plus it demands more rounds of communicating. 2. Present approach is implemented on desktop computer. Today for messaging people prefer Android based devices so we need a messaging application with HE which can execute on Android based devices 3. DTE is the core of Honey Encryption. So the good quality of DTE design for messaging application is a very challenging task because for every plain message the DTE should generate a meaningful output message so that the attacker get confuse.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1020 IV. PROPOSED ALGORITHMS A. Honey Encryption Honey encryption (HE) is a simple Method of encrypting messages using Non min-entropy keys for example passwords. He's intended to produce a cipher text which, when decrypted with any of a number of keys that were incorrect, yields plausible appearing but bogus plaintexts called honey messages. Honey Encryption [2] turns each wrong password guess made by a hacker to a perplexing dead-end. When an application or user sends and enters a password key to get an encrypted database or database, so long as the password is correct, the data is encrypted and accessible in its original, and readable, format. In case the password key is incorrect the data will last to be encrypted and invisibly. Hackers who steal databasesofuserloginsand passwords simply need to guess just one correct password to be able to get access to the data [2]. How that they understand they have the right password is as soon as the database or file becomes readable. By way of example, if a hacker created 100 password attempts, they would get 100 plain text success. Even if one of the passwordswerecorrect, the real data would be equal from the bogus data. Honey Encryption is broadly two step process, in first step DTE (Distribution Transforming Encoding) is happen with the input data then in second step SE (Symmetric Encryption) is happen to encrypt the encoded data. The following diagram shows the overall process of Honey Encryption Scheme. Figure-1: Honey Encryption Process Where the following table present the symbos detail in the figure1 Table-1: HE Symbols M Message S Seed C Cipher text K Key DTEncoder Discrete Transforming Encoder DTDecoder Discrete Transforming Decoder B. AES Algorithm The Popular and widely adopted symmetric encryption algorithm likely to be encountered nowadays is the Advanced Encryption Standard (AES). It's found at least six times faster than algorithms like triple DES. AES comprises three block ciphers: AES-128, AES-192 and AES-256. Each cipher encrypts and decrypts data in blocks of128bitsusing cryptographic keys of 128-, 192- and 256-bits, respectively. First the plain text block is put into an array then the data is processed in no of rounds repeatedly to change its original meaning. The number of rounds is depends upon the key size. For the key length 128 bit it takes 10 rounds,forthekey length 192 bit it takes 12 rounds and for key length 256bitit takes 14 rounds.[10] C. Blowfish Algorithm Blowfish is a symmetric block cipher developed by Bruce Schneier in 1993.It is a fastest algorithm can be Utilized as a drop-in replacement for DES or IDEA. Blowfish takes 64 bit input block of message to encrypt and requires a variable- length key, from 32 bits to 448 bits, which makes it ideal for both domestic and exportable use [8]. Ever since that time it has been analyzed considerably, and it's slowly gaining acceptance as a strong encryption algorithm. Blowfish is unpatented and license-free, and is available free for all applications. Blowfish is a Feistel network algorithm employed (Feistel Network), which consists of 16 rounds [10]. In this paper we combine this algorithm with Honey Encoding for the best performance of message security. V. PROPOSED METHODOLOGY The methodology will consist of following phases:- 1. At sender side first Encode message with Honey Encoding and generate encoded text. 2. Encrypt the encoded output with Symmetric key algorithm and key to generate cipher text. 3. At receiver side decrypt the cipher text with decryption algorithm and with samekeytoproduce the encoded text. 4. Then the encoded text is decoded with Honey Decoding to produce the original message. 5. Then calculate overall processing time The above 5 steps are perform 2 times. First time with AES and second time with Blowfish and thencomparetheoverall processing time in both the cases to find which encryption algorithm is best with Honey Encoding, whether it is AES or Blowfish.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1021 5.1 Overall process of proposed algorithm The following block diagram show the detailed steps of the proposed messaging systemusingHoneyEncodingwithAES. Figure -2: Proposed HE with AES Similar to the above diagram, The following Block diagram also show the detailed steps of the proposed system using Honey Encoding with Blowfish algorithm. Here also the overall processing time for HE _ Encoding, Blowfish _ Encryption, HE _ Decoding and Blowfish _ Decryption is calculated to compare the time taken by AES with HE. Figure-3: Proposed HE with Blowfish In the above two process in figure 1 and figure 2 the processing time are calculated at each case. We compare the processing timeconsumed byAESwithHEandBlowfishwith HE. Here the Blowfish algorithm takes less time as compare to AES. We implement this in our experiment bellow. VI. IMPLEMENTATION AND RESULT ANALYSIS In this section we implement the proposed methodology in Android studio by developing a simulated messaging application and the language used is java. Simulation Environment: The simulation usesthesuppliedclassesinjava environment to mimic the operation of AES and Blowfish. The implementation uses managed wrappers for AES and Blowfish available in java .cypto and java. Security [Crypto Spec] that wraps unmanaged Implementations available in JCE (Java CryptographyExtension)&JCA(Java Cryptography Architecture). The Cipher class provide the functionalityofa cryptographic cipher used for encryption and decryption. It forms the core of the JCE framework.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1022 Overall Performance with Honey Encryption: The comparative analysis of working time among the algorithms with Honey Encryption is as given below. Figure-4: The Simulated Result in Android Environment Comparative Analysis of AES and Blowfish with HE Performance Results using ECB and CBC Mode: To select any one encryption technique between AES and Blowfish, which is good for the Honey encoding we have to compare them according to their performance. The experiments were conducted using ECB and CBC mode with AES and Blowfish, the results are shown in figure 1 and Table 1 below. Table-2: Performance of AES and Blowfish with modes Techniques AES ECB mode Blowfish ECB mode AES CBC mode Blowfish CBC mode Time in Milliseconds 120 10 110 10 Figure-5: Performance graph of AES and Blowfish with ECB and CBC mode The result shows the excellence of Blowfish algorithm as compare to AES in terms of the processing time. It shows also that AES consumes more processing time with its ECB and CBC mode than Blowfish. So it is a good decision to choose Blowfish with Honey Encoding to save time and provide security. Table-2: Overall Execution time Techniques HE with AES HE with Blowfish Time taken in Milliseconds for a message 250 2 The experiment conducted shows the behavior patterns according to execution time. The above execution time reading clearly shows that the proposed approach Honey Encryption with Blowfish has less execution time as compared to HE with AES. Figure-5: Overall Execution Time Chart
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 09 | Sep -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1023 The above line chart show the timetaken byHoneyencoding with AES and Honey Encoding with Blowfish to encrypt and decrypt a single message. The HE with AES takes 250 milliseconds, while the HE with Blowfish takes only 2 milliseconds to performEncoding,Encryption,Decoding and Decryption for a single message. Figure-6: Messaging Screen VII. CONCLUSION The secure framework is successfully designed to provide security against Brute force attack with Honey encryption. For android based devices it is essentially needed that the messages must be send or receive quickly so we need an encryption algorithm which takes less time and secure to encrypt as compare to other, so Blowfish encryption algorithm is the good choice to integrate with Honey encoding. Because it takes less processing time as compare to AES. In future more secure framework can be developed by Incorporating Handshaking techniques for end to end empowerment between sender and receiver. Also we can apply the honey encryption with Blowfish in cloud computing security in future. REFERENCES [1] Joo-Im Kim and Ji Won Yoon, “Honey chatting: a novel instant messaging system Robust to eavesdropping over communication,” ICASSP,IEEE 2016 [2] Ari Juels, Thomas Ristenpart, “Honey Encryption Encryption Beyond the Brute-Force Barrier,” Copublished by the IEEE Computer and Reliability Societies , 2014 [3] N. Tyagi, J. Wang, K. Wen, and D. Zuo. “Honey encryption applications.,” Network Security, 2015. [4] Hoyul Choi, Hyunjae Nam, Junbeom Hur,”Password Typos Resilience in Honey Encryption,” International Conference on Information Networking, IEEE 2017 [5] Amir Emad Ghassami, Daniel Cullina, and Negar Kiyavash, “Message Partitioning and Limited Auxiliary Randomness: Alternatives to Honey Encryption,”IEEE International Symposium on Information Theory, 2016 [6] Ari Juels, Thomas Ristenpart , “Honey Encryption: Security Beyond the Brute-Force Bound ,“ EUROCRYPT 2014 [7] Neetesh Saxena ,Narendra S. Chaudhary“EasySMS: A Protocol For End-to-End Secure Trans-missionOf SMS” IEEE Transactions OnInformation Forensics And Security, Vol. 9, No. 7,July 2014 [8] Muhammad Kamran Asif, Yahya Subhi Al-Harthi, “Intrusion Detection System using Honey Token based Encrypted Pointers to MitigateCyberThreats for Critical Infrastructure Networks,” International Conference on Systems, Man, and Cybernetics,IEEE 2014 [9] Sourabh Chandra, Smita Paira ,” A comparative survey of symmetric and asymmetric key cryptography,” International Conference on Electronics, Communication and Computational Engineering (ICECCE), IEEE 2014 [10] G. Sowmya, D.Jamuna, M.Venkatakrishna Reddy, “Blocking of Brute Force Attack”, International Journal of Engineering Research & Technology(IJERT), ISSN:2278-0181 Vol. 1 Issue 6, August-2012 [11] P. Princy “A Comparison Of Symmetric Key Algorithms DES, AES, BLOWFISH, RC4, RC6: A Survey” International Journal of Computer Science & Engineering Technology ISSN : 2229-3345 Vol. 6 No. 05 May 2015 [12] Priyanka Chouhan, Rajendra Singh,” Security Attacks on Cloud Computing With Possible Solution”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 1, January 2016 [13] Varsha S.Bari1,Nileema R.Ghuge,ChaitaliC. Wagh,Sayali R. Sonawane ,Mr.M.B. Gawali“, SMS Encryption on Android Message Application”, IJARIIE-ISSN (O)-2395-4396 Vol-2 Issue-2 2016.