Malicious cryptography - exposing cryptovirology
نویسندگان
چکیده
منابع مشابه
Cryptovirology: Virus Approach
Traditionally, "Cryptography" is a benediction to information processing and communications, it helps people to store information securely and the private communications over long distances. Cryptovirology is the study of applications of cryptography to build the malicious software. It is an investigation, how modern cryptographic tools and paradigms can be used to strengthen, develop and impro...
متن کاملChapter 2 : An Implementation of Cryptoviral Extortion Using Microsoft ’ s Crypto API ∗
This chapter presents an experimental implementation of cryptoviral extortion, an attack that we devised and presented at the 1996 IEEE Symposium on Security & Privacy [16] and that was recently covered in Malicious Cryptography [17]. The design is based on Microsoft’s Cryptographic API and the salient aspects of the implementation were presented at ISC ’05 [14] and were later refined in the In...
متن کاملA Review Report on Cryptovirology and Cryptography
Cryptography has traditionally been used for defensive purposes. Ciphers defend against a passive eavesdropper. Public key infrastructures defend against an active adversary that mounts a man-in-the-middle attack. Digital signature algorithms defend against a forger. Ecash systems defend against a counterfeiter and a double-spender. Pseudorandom bit generators defend against a next-bit predicto...
متن کاملChapter 4 : Implementing Perfect Questionable Encryptions ∗
The notion of a questionable encryption scheme was first put forth in Malicious Cryptography [10]. In this chapter we present an implementation of the perfect questionable encryption scheme that appears in [9] that is based on our MyCrypt ’05 paper [11]. A questionable encryption (q.e.) scheme is a generalization of a PKCS that includes an additional key generation algorithm that outputs a fake...
متن کاملDeniable Password Snatching: On the Possibility of Evasive Electronic Espionage
Trojans, viruses and other malware can be categorized as either active or passive in nature. Active viruses (for example) are viruses that perform some outwardly noticeable function. They are typically ooensive in nature and cause denial of service attacks or other disturbances. In the electronic warfare context they can translate into \direct military attacks". Passive viruses are, on the othe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004