Select Page

Malicious Cryptography: Exposing Cryptovirology

Malicious Cryptography: Exposing Cryptovirology

I start reading this book 2 days ago (135pages read of 412 pages), It is quite interesting, especially the chapter about pseudo-random generator quality and bias, Zero knowledge protocol, polymorphic virus body using relatively small algorithm (TEA)…It also propose some solutions but I did not reach this chapter…

Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it.

Malicious Cryptography: Exposing Cryptovirology
Adam Young, Moti Yung
ISBN: 0-7645-4975-8

  • Understand the mechanics of computationally secure information stealing
  • Learn how non-zero sum Game Theory is used to develop survivable malware
  • Discover how hackers use public key cryptography to mount extortion attacks
  • Recognize and combat the danger of kleptographic attacks on smart-card devices
  • Build a strong arsenal against a cryptovirology attack

Preface by security expert Bruce Schneier (Pratical Cryptography a reference)

About The Author

I worked with various Insurances companies across Switzerland on online applications handling billion premium volumes. I love to continuously spark my creativity in many different and challenging open-source projects fueled by my great passion for innovation and blockchain technology.In my technical role as a senior software engineer and Blockchain consultant, I help to define and implement innovative solutions in the scope of both blockchain and traditional products, solutions, and services. I can support the full spectrum of software development activities, starting from analyzing ideas and business cases and up to the production deployment of the solutions.I'm the Founder and CEO of Disruptr GmbH.