Malicious cryptography - exposing cryptovirology

نویسندگان

  • Adam L. Young
  • Moti Yung
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptovirology: Virus Approach

Traditionally, "Cryptography" is a benediction to information processing and communications, it helps people to store information securely and the private communications over long distances. Cryptovirology is the study of applications of cryptography to build the malicious software. It is an investigation, how modern cryptographic tools and paradigms can be used to strengthen, develop and impro...

متن کامل

Chapter 2 : An Implementation of Cryptoviral Extortion Using Microsoft ’ s Crypto API ∗

This chapter presents an experimental implementation of cryptoviral extortion, an attack that we devised and presented at the 1996 IEEE Symposium on Security & Privacy [16] and that was recently covered in Malicious Cryptography [17]. The design is based on Microsoft’s Cryptographic API and the salient aspects of the implementation were presented at ISC ’05 [14] and were later refined in the In...

متن کامل

A Review Report on Cryptovirology and Cryptography

Cryptography has traditionally been used for defensive purposes. Ciphers defend against a passive eavesdropper. Public key infrastructures defend against an active adversary that mounts a man-in-the-middle attack. Digital signature algorithms defend against a forger. Ecash systems defend against a counterfeiter and a double-spender. Pseudorandom bit generators defend against a next-bit predicto...

متن کامل

Chapter 4 : Implementing Perfect Questionable Encryptions ∗

The notion of a questionable encryption scheme was first put forth in Malicious Cryptography [10]. In this chapter we present an implementation of the perfect questionable encryption scheme that appears in [9] that is based on our MyCrypt ’05 paper [11]. A questionable encryption (q.e.) scheme is a generalization of a PKCS that includes an additional key generation algorithm that outputs a fake...

متن کامل

Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage

Trojans, viruses and other malware can be categorized as either active or passive in nature. Active viruses (for example) are viruses that perform some outwardly noticeable function. They are typically ooensive in nature and cause denial of service attacks or other disturbances. In the electronic warfare context they can translate into \direct military attacks". Passive viruses are, on the othe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004