Cryptovirology
#1
Information 

Cryptovirology is a field that studies how to use cryptography to design powerful malicious software. It encompasses overt attacks such as cryptoviral extortion where a cryptovirus, cryptoworm, or cryptotrojan hybrid encrypts the victim's files and the user must pay the malware author to receive the needed session key (that is encrypted under the author's public key that is contained in the malware). The field also encompasses covert attacks in which the attacker secretly steals private information such as private keys. An example of the latter type of attack are asymmetric backdoors. An asymmetric backdoor is a backdoor (e.g., in a cryptosystem) that can only be used by the attacker even after it is found. There are many other attacks in the field that are not mentioned here.
Reply
#2



ABSTRACT
CRYPTOVIROLOGY:
"Cryptovirology" is a field that studies how to use cryptography to design powerful malicious software.It encompasses overt attacks such as cryptoviral extortion where a cryptoworm, or cryptotrojan hybrid encrypts the victim's files and the user must pay the malware author to receive the needed session key malware(that is encrypted that is encrypted under the author's public key that is contained in the malware) .The field also encompasses covert attacks in which the attacker secretly steals private information such as private keys. An example of the latter type of attack are asymmetric backdoors . Cryptoviral extor-tion is a 2-party protocol between an attacker and a victim that is carried out by a cryptovirus,cryptoworm, or cryptotrojan. In a cryp toviral extortion attack the malware hybrid encrypts the plaintext of toviral extortion attack the malware hybrid encrypts the plaintext of the victim using the public key of the attacker. The attacker extorts some form of payment from the victim in return for the plaintext that is held hostage. In addition to providing hands- on experience with this cryptographic protocol, this chapter gives readers a chance to: Learn the basics of hybrid encryption that is commonly used in everything from secure e- mail applications to secure socket connections.

Gain a basic understanding of how to use Microsoft's Cryptographic API that is present in modern MS Windows operating systems.


The chapter only provides an experimental version of the payload, no self- replicating code is given. We conclude with proactive measures that can be taken by computer users and computer manufacturers alike to minimize the threat posed by this type of cryptovirology attack

Reply
#3
can u send me the latest information abt cryptovirology



Reply
#4

pls help me for my dissertation for this area
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: slides for the presentation of cryptovirology, seminar ppt for cryptovirology, cryptovirology seminar, applications of cryptovirology, cryptovirology doc, superworms and cryptovirology tech seminar ppt, ppt on superworms and cryptovirology a deadly combination,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cryptovirology justlikeheaven 3 5,240 12-02-2010, 10:04 AM
Last Post: project report tiger
  Cryptovirology seminar projects crazy 3 2,464 04-10-2009, 03:17 PM
Last Post: Electrical Fan

Forum Jump: