Professional Documents
Culture Documents
ON
CRYPTOVIROLOGY
By,
VASUDEVA PURANIK P
8th CSE
Guided By,
Ms.SREEDEVI S B.E., M.Tech.,
YOU HAVE AN ANTI-VIRUS SOFTWARE!!!!
CRYPTOVIRUS
NO…
YOUR SYSTEM MAY BE INFECTED BY CRYPTOVIRUS
CONTENTS
• Basic Definitions
• CryptoVirus
• Comparison b/n Virus and CryptoVirus
• CryptoVirus Attacks
• Kleptography
• Cryptovirology- a right way of use
• Conclusion limit
Cryptovirology is the study of the applications of cryptography to malicious software.
It deals with the use of cryptographic techniques to strengthen, improve, and develop
new malicious attacks.
Malicious software is a set of instructions that violates the security policies of a
system.
examples : Trojan horse, Virus, Worms etc.
Kleptography is an art and science of stealing information securely and secretly.
Trojan Horse is program with an overt (documented or known) effect and a covert
(undocumented or unexpected) effect.
Virus is a self-replicating program that spreads by inserting (possibly modified) copies
of itself into other executable code or documents.
Anti-virus is a program that attempts to identify, prevent and eliminate computer
viruses and other malicious software. It is mainly built upon pattern matching
(signatures) and upon identifying suspicious behaviors.
A simple virus detection mechanism
Antivirus mechanism
Fig: An encrypted virus. The ordinary virus code is at the left. The
encrypted virus, plus encapsulating decryption information , is at the right.
Private key
Pattern matching
Matching virus functionality
Code-n shifts Nloo#Doo T/C Info n = 3
T/C = Timer -> How much time to infect Counter -> How many files to infect
Stage 1 :
Cryptovirus get entering
to the System.
Entry point to
the system
A copy of malicious codes
Stage 3 :
•Then Cryptovirus
starts encrypting
the files present in
the system by using
some predefined
secret key.
CRYPTOVIRAL EXTORTION….
•black-box cryptosystem can only be used without verifying the correctness of its
implementation
2.STEALING INFORMATION : A COVERT ATTACK
Stage 1 :
Alice Bob
•A normal communication between Alice and Bob
Stage 3 :
Stage 2 :
Bobs
Secret
key
Trudy Bob
Alice
Communication continued through the active intruder Trudy Trudy’s code gets the Bob’s secret key.
Sends his code too.
Stage 5 :
Stage 4 :
•If any intruder hacks the CryptoVirPacket, his system will get infected by CryptoVirus .
• And our Devil will play a Game until he decrypts the message and runs the
Virus removal code.
Conclusion
•The best defense is to: verify the authenticity of all programs that you run,
have backup of important information, use existing antiviral tools, and so forth.
•We have learnt how Cryptography can be used to implement viruses that are
able to mount extortion-based attacks on their hosts.
•We can also use Cryptovirology to secure the data in an offensive mode.
References