Honey Encryption: Fortification Beyond the Brute-Force Impediment