Cryptovirology
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
24-02-2009, 12:38 AM


Cryptovirology is a field that studies how to use cryptography to design powerful malicious software. It encompasses overt attacks such as cryptoviral extortion where a cryptovirus, cryptoworm, or cryptotrojan hybrid encrypts the victim's files and the user must pay the malware author to receive the needed session key (that is encrypted under the author's public key that is contained in the malware). The field also encompasses covert attacks in which the attacker secretly steals private information such as private keys. An example of the latter type of attack are asymmetric backdoors. An asymmetric backdoor is a backdoor (e.g., in a cryptosystem) that can only be used by the attacker even after it is found. There are many other attacks in the field that are not mentioned here.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#2
14-10-2010, 11:21 AM




ABSTRACT
CRYPTOVIROLOGY:
"Cryptovirology" is a field that studies how to use cryptography to design powerful malicious software.It encompasses overt attacks such as cryptoviral extortion where a cryptoworm, or cryptotrojan hybrid encrypts the victim's files and the user must pay the malware author to receive the needed session key malware(that is encrypted that is encrypted under the author's public key that is contained in the malware) .The field also encompasses covert attacks in which the attacker secretly steals private information such as private keys. An example of the latter type of attack are asymmetric backdoors . Cryptoviral extor-tion is a 2-party protocol between an attacker and a victim that is carried out by a cryptovirus,cryptoworm, or cryptotrojan. In a cryp toviral extortion attack the malware hybrid encrypts the plaintext of toviral extortion attack the malware hybrid encrypts the plaintext of the victim using the public key of the attacker. The attacker extorts some form of payment from the victim in return for the plaintext that is held hostage. In addition to providing hands- on experience with this cryptographic protocol, this chapter gives readers a chance to: Learn the basics of hybrid encryption that is commonly used in everything from secure e- mail applications to secure socket connections.

Gain a basic understanding of how to use Microsoft's Cryptographic API that is present in modern MS Windows operating systems.


The chapter only provides an experimental version of the payload, no self- replicating code is given. We conclude with proactive measures that can be taken by computer users and computer manufacturers alike to minimize the threat posed by this type of cryptovirology attack



Attached Files
.doc   Seminar Repor1.doc (Size: 85.5 KB / Downloads: 118)
Reply
priya shetty
Active In SP
**

Posts: 2
Joined: Mar 2011
#3
22-03-2011, 04:32 PM

can u send me the latest information abt cryptovirology



Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cryptovirology justlikeheaven 3 4,967 12-02-2010, 10:04 AM
Last Post: project report tiger
  Cryptovirology seminar projects crazy 3 1,803 04-10-2009, 03:17 PM
Last Post: Electrical Fan