Corpus ID: 15969555

An Implementation of Cryptoviral Extortion Using Microsoft's Crypto API

@inproceedings{Young2006AnIO,
  title={An Implementation of Cryptoviral Extortion Using Microsoft's Crypto API},
  author={A. Young and M. Yung},
  year={2006}
}
  • A. Young, M. Yung
  • Published 2006
  • Computer Science
  • This chapter presents an experimental implementation of cryptoviral extortion, an attack that we devised and presented at the 1996 IEEE Symposium on Security & Privacy [16] and that was recently covered in Malicious Cryptography [17]. The design is based on Microsoft’s Cryptographic API and the salient aspects of the implementation were presented at ISC ’05 [14] and were later rened in the International Journal of Information Security [15]. Cryptoviral extortion is a 2-party protocol between an… CONTINUE READING
    9 Citations
    Cryptovirology: Virus Approach
    • 6
    • PDF
    PayBreak: Defense Against Cryptographic Ransomware
    • 104
    • PDF
    Ransomware Analysis and Defense-WannaCry and the Win32 environment
    • 2
    Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation)
    • 9
    Ransomware Network Traffic Analysis for Pre-encryption Alert
    • 1
    • PDF
    Vulnerability Analysis on the CNG Crypto Library
    • Kyungroul Lee, I. You, Kangbin Yim
    • Computer Science
    • 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
    • 2015
    • 3

    References

    SHOWING 1-10 OF 25 REFERENCES
    Cryptovirology: extortion-based security threats and countermeasures
    • A. Young, M. Yung
    • Computer Science
    • Proceedings 1996 IEEE Symposium on Security and Privacy
    • 1996
    • 171
    • PDF
    Cryptoviral extortion using Microsoft's Crypto API
    • A. Young
    • Computer Science
    • International Journal of Information Security
    • 2006
    • 28
    Building a Cryptovirus Using Microsoft's Cryptographic API
    • 11
    Malicious cryptography - exposing cryptovirology
    • 134
    • PDF
    OAEP Reconsidered
    • 438
    • PDF
    A method for obtaining digital signatures and public-key cryptosystems
    • 7,143
    • PDF
    On the security of multiple encryption
    • 227
    • PDF
    Optimal Asymmetric Encryption
    • 906
    • PDF
    RSA-OAEP Is Secure under the RSA Assumption
    • 390
    • PDF
    Random oracles are practical: a paradigm for designing efficient protocols
    • 4,554
    • PDF