Book description
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back.
They will take you inside the brilliant and devious mind of a hacker—as much an addict as the vacant-eyed denizen of the crackhouse—so you can feel the rush and recognize your opponent's power. Then, they will arm you for the counterattack.
This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now.
Understand the mechanics of computationally secure information stealing
Learn how non-zero sum Game Theory is used to develop survivable malware
Discover how hackers use public key cryptography to mount extortion attacks
Recognize and combat the danger of kleptographic attacks on smart-card devices
Build a strong arsenal against a cryptovirology attack
Table of contents
- Cover Page
- Title Page
- Copyright
- Dedication
- Contents
- Foreword
- Acknowledgments
- Introduction
- Chapter 1: Through Hacker's Eyes
- Chapter 2: Cryptovirology
-
Chapter 3: Tools for Security and Insecurity
- 3.1 Sources of Entropy
- 3.2 Entropy Extraction via Hashing
- 3.3 Unbiasing a Biased Coin
- 3.4 Combining Weak Sources of Entropy
- 3.5 Pseudorandom Number Generators
- 3.6 Uniform Sampling
- 3.7 Random Permutation Generation
- 3.8 Sound Approach to Random Number Generation and Use
- 3.9 RNGs Are the Beating Heart of System Security
- 3.10 Cryptovirology Benefits from General Advances
- 3.11 Anonymizing Program Propagation
- Chapter 4: The Two Faces of Anonymity
- Chapter 5: Cryptocounters
- Chapter 6: Computationally Secure Information Stealing
- Chapter 7: Non-Zero Sum Games and Survivable Malware
- Chapter 8: Coping with Malicious Software
- Chapter 9: The Nature of Trojan Horses
- Chapter 10: Subliminal Channels
-
Chapter 11: SETUP Attack on Factoring Based Key Generation
- 11.1 Honest Composite Key Generation
- 11.2 Weak Backdoor Attacks on Composite Key Generation
- 11.3 Probabilistic Bias Removal Method
- 11.4 Secretly Embedded Trapdoors
- 11.5 Key Generation SETUP Attack
- 11.6 Security of the SETUP Attack
- 11.7 Detecting the Attack in Code Reviews
- 11.8 Countering the SETUP Attack
- 11.9 Thinking Outside the Box
- 11.10 The Isaac Newton Institute Lecture
-
Chapter 12: SETUP Attacks on Discrete-Log Cryptosystems
- 12.1 The Discrete-Log SETUP Primitive
- 12.2 Diffie-Hellman SETUP Attack
- 12.3 Security of the Diffie-Hellman SETUP Attack
- 12.4 Intuition Behind the Attack
- 12.5 Kleptogram Attack Methodology
- 12.6 PKCS SETUP Attacks
- 12.7 SETUP Attacks on Digital Signature Algorithms
- 12.8 Rogue Use of DSA for Encryption
- 12.9 Other Work in Kleptography
- 12.10 Should You Trust Your Smart Card?
- Appendix A: Computer Virus Basics
- Appendix B: Notation and Other Background Information
- Appendix C: Public Key Cryptography in a Nutshell
- Glossary
- References
- Index
Product information
- Title: Malicious Cryptography: Exposing Cryptovirology
- Author(s):
- Release date: February 2004
- Publisher(s): Wiley
- ISBN: 9780764549755
You might also like
book
Disappearing Cryptography, 3rd Edition
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. …
book
Software Test Attacks to Break Mobile and Embedded Devices
This book presents an attack basis for testing mobile and embedded systems in "smart" devices. It …
book
Crypto Dictionary
Expand your mind and your crypto knowledge with the ultimate desktop dictionary for all things cryptography. …
book
Microsoft Windows 2000 API SuperBible
Following in the tradition of the Win 95 and Win32 NT SuperBibles, this book is a …