An Implementation of Cryptoviral Extortion Using Microsoft's Crypto API
@inproceedings{Young2006AnIO, title={An Implementation of Cryptoviral Extortion Using Microsoft's Crypto API}, author={A. Young and M. Yung}, year={2006} }
This chapter presents an experimental implementation of cryptoviral extortion, an attack that we devised and presented at the 1996 IEEE Symposium on Security & Privacy [16] and that was recently covered in Malicious Cryptography [17]. The design is based on Microsoft’s Cryptographic API and the salient aspects of the implementation were presented at ISC ’05 [14] and were later rened in the International Journal of Information Security [15]. Cryptoviral extortion is a 2-party protocol between an… CONTINUE READING
Topics from this paper
9 Citations
Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation)
- Computer Science
- 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
- 2013
- 9
Vulnerability Analysis on the CNG Crypto Library
- Computer Science
- 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
- 2015
- 3
Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure
- Computer Science
- NordSec
- 2017
- 16
- PDF
References
SHOWING 1-10 OF 25 REFERENCES
Cryptovirology: extortion-based security threats and countermeasures
- Computer Science
- Proceedings 1996 IEEE Symposium on Security and Privacy
- 1996
- 171
- PDF
Cryptoviral extortion using Microsoft's Crypto API
- Computer Science
- International Journal of Information Security
- 2006
- 28
A method for obtaining digital signatures and public-key cryptosystems
- Computer Science
- CACM
- 1978
- 7,143
- PDF
Random oracles are practical: a paradigm for designing efficient protocols
- Computer Science
- CCS '93
- 1993
- 4,554
- PDF