Cryptovirology: Virus Approach

نویسنده

  • Saurabh Anandrao Shivale
چکیده

Traditionally, "Cryptography" is a benediction to information processing and communications, it helps people to store information securely and the private communications over long distances. Cryptovirology is the study of applications of cryptography to build the malicious software. It is an investigation, how modern cryptographic tools and paradigms can be used to strengthen, develop and improve new malicious software attacks. Cryptovirology attacks have been categorized as : give malware enhanced privacy and be more robust against reverse-engineering, secondly give the attacker enhanced anonymity while communicating with deployed malware. This paper presents the idea of ``Cryptovirology'' which introduce a twist on how cryptography can also be used offensively. Being offensive means, it can be used to mount extortion based attacks that cause loss of access to information, loss of confidentiality, and information leakage, tasks which cryptography usually prevents. Also analyze threats and attacks that misuse of cryptography can cause when combined with fraudulent software (viruses, Trojans). Public-key cryptography is very essential for the attacks that based on cryptovirology. This paper also suggest some of the countermeasures, mechanisms to cope with and prevent such attacks. Even if the attackers actions on the host machine are being monitored, it still cannot be proven beyond reasonable doubt that he or she is the attacker; and it is an “originator-concealing attack”. Evidence should be collected from the “author’s own system which was used for the attack”. These attacks have implications on how the use of cryptographic tools and techniques should be audited and managed in general purpose computing environments, and imply that access to the cryptographic tools should be in well control of the system(such as API routines). The experimental virus would demonstrate how cryptographic packages can be packed into a small space, which may have independent existence. These are many powerful attacks, where the attacker can encrypt the victim’s data for ransom and release it after hostage.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ar X iv : 0 71 1 . 06 92 v 1 [ cs . C R ] 5 N ov 2 00 7 On the defence notion ⋆

“Trojan horses”, “logic bombs”, “armoured viruses” and “cryptovirology” are terms recalling war gears. In fact, concepts of attack and defence drive the world of computer virology, which looks like a war universe in an information society. This war has several shapes, from invasions of a network by worms, to military and industrial espionage. . . For convenience, and because the term “virus” ha...

متن کامل

A Review Report on Cryptovirology and Cryptography

Cryptography has traditionally been used for defensive purposes. Ciphers defend against a passive eavesdropper. Public key infrastructures defend against an active adversary that mounts a man-in-the-middle attack. Digital signature algorithms defend against a forger. Ecash systems defend against a counterfeiter and a double-spender. Pseudorandom bit generators defend against a next-bit predicto...

متن کامل

Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage

Trojans, viruses and other malware can be categorized as either active or passive in nature. Active viruses (for example) are viruses that perform some outwardly noticeable function. They are typically ooensive in nature and cause denial of service attacks or other disturbances. In the electronic warfare context they can translate into \direct military attacks". Passive viruses are, on the othe...

متن کامل

Chapter 10 : An Elliptic Curve Asymmetric Backdoor in OpenSSL RSA Key Generation ∗

In this chapter we present an experimental implementation of an asymmetric backdoor in RSA key generation. The implementation is written in ANSI C. We codified what it means for an asymmetric backdoor to be secure (for the designer) in our definition of a secretly embedded trapdoor with universal protection (SETUP). The main properties of a SETUP are: (1) the complete code for the backdoor does...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1108.2482  شماره 

صفحات  -

تاریخ انتشار 2011