{"id":1670,"date":"2014-01-31T00:41:07","date_gmt":"2014-01-31T05:41:07","guid":{"rendered":"http:\/\/www.opensource.im\/?p=1670"},"modified":"2014-01-31T00:41:07","modified_gmt":"2014-01-31T05:41:07","slug":"baffle-thy-enemy-the-case-for-honey-encryption","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/baffle-thy-enemy-the-case-for-honey-encryption.php","title":{"rendered":"Baffle thy enemy: The case for Honey Encryption"},"content":{"rendered":"<p><p>12 hours ago by Nancy Owano             Credit: Symantec      <\/p>\n<p>    (Phys.org) Database breaches are making today's headlines,    revealing events where thieves scoff up millions of passwords.    Security experts meanwhile think about, talk about and work    towards fighting against such crimes. A fresh twist in the    security arsenal might be to simply baffle criminals by    unleashing a flood of data that appears real but is fake.    \"Honey Encryption\" is an approach being proposed to protect    sensitive data. You beat attackers by making it difficult to    figure out if the password or encryption key they are trying to    steal is correct or incorrect.  <\/p>\n<p>    A discussion about the approach on Wednesday in    Threatpost said the tool results in the attacker seeing    a plausible-looking password or encryption key which is    actually incorrect, and the attacker cannot tell the    information is incorrect. The two people    behind this Honey Encryption approach is Ari Juels, former    chief scientist at computer security company RSA, and Thomas    Ristenpart, an assistant professor at the University of    Wisconsin.  <\/p>\n<p>    As it is now, a criminal intruder, with each try of an    incorrect key, sees gibberish. The unsuccessful try clearly    indicates it is not what he or she wants. With honey    encryption, however, trying to guess the password or encryption key becomes mystifying; the attacker    is dealing with thousands of, say, fake credit card numbers,    and each one looks plausible. A     report about their work in MIT Technology Review    said Juels was convinced that \"by now enough password dumps    have leaked online to make it possible to create fakes that    accurately mimic collections of real passwords.\"  <\/p>\n<p>    In October, Juels had said that \"Honeywords and    honey-encryption represent some of the first steps toward the    principled use of decoys, a time-honored and increasingly    important defense in a world of frequent, sophisticated, and    damaging security breaches.\" He said that the    honeywords and honey encryption are joint work, respectively, with Ron    Rivest and Tom Ristenpart. He said honey-encryption creates    \"ciphertexts that decrypt under incorrect keys to seemingly    valid (decoy) messages.\"  <\/p>\n<p>    The Honey Encryption system, meanwhile, will be the subject of    a paper later this year when Juels and Ristenpart present their    \"Honey Encryption: Security Beyond the Brute-Force Bound\" at    the Eurocrypt conference in May, an event that is focused on    cryptographic techniques, in Copenhagen.<\/p>\n<p>     Explore further:     Research trio crack RSA encryption keys by listening to    computer noise  <\/p>\n<p>     2014 Phys.org<\/p>\n<p>      (Phys.org) A trio of researchers in Israel has discovered      that it is possible to crack 4096-bit RSA encryption keys      using a microphone to listen to high-pitch noises generated      by internal computer components. ...    <\/p>\n<p>      IBM inventors have received a patent for a breakthrough data      encryption technique that is expected to further data privacy      and strengthen cloud computing security.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/phys.org\/news310305017.html\" title=\"Baffle thy enemy: The case for Honey Encryption\">Baffle thy enemy: The case for Honey Encryption<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> 12 hours ago by Nancy Owano Credit: Symantec (Phys.org) Database breaches are making today's headlines, revealing events where thieves scoff up millions of passwords. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-1670","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1670"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=1670"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1670\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=1670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=1670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=1670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}