There have been many efforts to strengthen security of Instant Messaging (IM) system. One of the typical technologies is the conventional message encryption using a secret or private key. However, the key is fundamentally vulnerable to a brute-force attack, causing to acquire the original message. In this respect, a countermeasure was suggested as the way to generating plausible-looking but fake plaintexts, which is called Honey Encryption (HE). In this paper, we present a HE-based statistical scheme and design a Honey Chatting application, which is robust to eavesdropping. Besides, we verify the effectiveness of the Honey Chatting by comparing the entropy of decrypted messages through experiments.
|Title of host publication||2016 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016 - Proceedings|
|Publisher||Institute of Electrical and Electronics Engineers Inc.|
|Number of pages||5|
|Publication status||Published - 2016 May 18|
|Event||41st IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016 - Shanghai, China|
Duration: 2016 Mar 20 → 2016 Mar 25
|Name||ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings|
|Other||41st IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016|
|Period||16/3/20 → 16/3/25|
Bibliographical noteFunding Information:
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (NRF-2013R1A1A1012797).
© 2016 IEEE.
- Brute-force attack
- Honey Encryption
- Instant Messaging
ASJC Scopus subject areas
- Signal Processing
- Electrical and Electronic Engineering