Honey Encryption for Language - Robbing Shannon to Pay Turing?

نویسندگان

  • Marc Beunardeau
  • Houda Ferradi
  • Rémi Géraud
  • David Naccache
چکیده

Honey Encryption (HE), introduced by Juels and Ristenpart (Eurocrypt 2014, [13]), is an encryption paradigm designed to produce ciphertexts yielding plausible-looking but bogus plaintexts upon decryption with wrong keys. Thus brute-force attackers need to use additional information to determine whether they indeed found the correct key. At the end of their paper, Juels and Ristenpart leave as an open question the adaptation of honey encryption to natural language messages. A recent paper by Chatterjee et al. [5] takes a mild attempt at the challenge and constructs a natural language honey encryption scheme relying on simple models for passwords. In this position paper we explain why this approach cannot be extended to reasonable-size human-written documents e.g. e-mails. We propose an alternative solution and evaluate its security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Some improvements in fuzzy turing machines

In this paper, we improve some previous definitions of fuzzy-type Turing machines to obtain degrees of accepting and rejecting in a computational manner. We apply a BFS-based search method and some level’s upper bounds to propose a computational process in calculating degrees of accepting and rejecting. Next, we introduce the class of Extended Fuzzy Turing Machines equipped with indeterminacy s...

متن کامل

Nectar-Robbing Carpenter Bees Reduce Seed-Setting Capability of Honey Bees (Hymenoptera: Apidae) in Rabbiteye Blueberry, Vaccinium ashei, ‘Climax’

Thecarpenterbee,Xylocopavirginica(L.), acts as aprimarynectar thief in southeastern plantations of native rabbiteye blueberry, Vaccinium ashei Reade, perforating corollae laterally to imbibe nectar. Honey bees, Apis mellifera L., learn to collect nectar from these perforations and thus become secondary thieves. We conducted a 2-yr study to assess how nectar robbing in honey bees affects fruit p...

متن کامل

Title: Content analysis of English high school textbooks based on Shannon entropy method

Introduction: English language teaching curriculum is very important in effective teaching and learning of students. In order to pay attention to the importance of teaching English as one of the most important communication tools, it is necessary to develop a curriculum that can accommodate all the necessary English language teaching needs. Therefore, the purpose of this study is to analyze t...

متن کامل

Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption

Secure function evaluation (SFE) is the process of computing a function (or running an algorithm) on some data, while keeping the input, output and intermediate results hidden from the environment in which the function is evaluated. This can be done using fully homomorphic encryption, Yao's garbled circuits or secure multiparty computation. Applications are manifold, most prominently the outsou...

متن کامل

Varroa destructor Mites Can Nimbly Climb from Flowers onto Foraging Honey Bees

Varroa destructor, the introduced parasite of European honey bees associated with massive colony deaths, spreads readily through populations of honey bee colonies, both managed colonies living crowded together in apiaries and wild colonies living widely dispersed in natural settings. Mites are hypothesized to spread between most managed colonies via phoretically riding forager bees when they en...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016