Hmmm. This is pretty interesting. I could imagine doing the same with pre-written out messages too. Write two messages, one real with a stronger key or password, one with a weaker one. It would allow you to not only stop the brute force, but also give Eve bad intelligence.
Well, that sucks. The paper appears to be paywalled by IEEE[0]. Are there any freely-available references to this work?<p>Edit: Eureka! A pre-pub version on the page of the other author <a href="http://pages.cs.wisc.edu/~rist/papers/HoneyEncryptionpre.pdf" rel="nofollow">http://pages.cs.wisc.edu/~rist/papers/HoneyEncryptionpre.pdf</a><p>[0] <a href="http://ieeexplore.ieee.org/document/6876246/" rel="nofollow">http://ieeexplore.ieee.org/document/6876246/</a>
While this is interesting, what effective bruteforce techniques are there against currently used encryption?<p>Even 3DES is still likely to be secure against all but state actors.<p>Mind you this can't be used with hashing since this effectively be a collision (could possibly be used with salt poisoning and potentially with variance in rounds).