conclusion for cryptovirology
#1

okay show me the conclusion of the cryptovirology
Reply
#2
Conclusion

Cryptovirology is a field that studies how to use cryptography to design powerful malicious software. The field was born with the observation that public-key cryptography can be used to break the symmetry between what a malware analyst sees regarding malware and what the malware creator sees. The former sees a public key in the malware whereas the latter sees the public key as well as the corresponding private key since the malware designer created the key pair for the attack. The public key allows the malware to perform trapdoor one-way operations on the victim's computer that only the malware creator can undo.The first attack that was identified in the field is called "cryptoviral extortion". In this attack a cryptovirus, cryptoworm, or cryptotrojan hybrid encrypts the victim's files and the victim must pay the malware author to receive the needed session key (which is encrypted under the malware creator's public key that is contained in the malware). The victim needs the session key if the files are needed and there are no backups of them. Many years later the media relabeled this attack as ransomware.The field also encompasses covert attacks in which the attacker secretly steals private information such as private keys. An example of the latter type of attack are asymmetric backdoors. An asymmetric backdoor is a backdoor (e.g., in a cryptosystem) that can be used only by the attacker, even after it is found. This contrasts with the traditional backdoor that is symmetric, i.e., anyone that finds it can use it. Kleptography, a subfield of cryptovirology, is the study of asymmetric back doors in key generation algorithms, digital signature algorithms, key exchanges, and other cryptographic algorithms. The NIST Dual EC DRBG random bit generator has an alleged asymmetric backdoor in it. The EC-DRBG algorithm utilizes the discrete-log kleptogram from Kleptography. There is a misconception that cryptovirology is mostly about extortion attacks (overt attacks). In fact, the vast majority of cryptovirology attacks are covert in nature.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: rubiconprojectcom malware,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Shocked scope and excitement of physics conclusion 1 866 08-06-2016, 04:01 PM
Last Post: dhanabhagya
  conclusion of digital alarm clock 1 538 25-05-2016, 01:28 PM
Last Post: dhanabhagya
  multivibrator seminars report conclusion 1 618 10-05-2016, 11:23 AM
Last Post: dhanabhagya
  conclusion thesis on the bcd to7 segment decoder using ic cd4543be 1 566 07-05-2016, 11:14 AM
Last Post: dhanabhagya
  what is a electromagnetic crane conclusion 1 637 07-05-2016, 11:01 AM
Last Post: dhanabhagya
Wink conclusion of multi agri cutter ppt 1 590 25-04-2016, 11:57 AM
Last Post: dhanabhagya
  battery charger circuit using scr conclusion 1 699 22-04-2016, 11:20 AM
Last Post: dhanabhagya
  customer satisfaction of honda activa introduction and conclusion 1 672 13-04-2016, 10:25 AM
Last Post: dhanabhagya
Wink conclusion for hydraulic braking system seminar 1 1,154 06-04-2016, 09:45 AM
Last Post: dhanabhagya
Question Cryptovirology Cherub988 1 1,550 22-03-2010, 09:12 PM
Last Post: seminar-avatar

Forum Jump: