An Implementation of Cryptoviral Extortion Using Microsoft's Crypto API

@inproceedings{Young2006AnIO,
  title={An Implementation of Cryptoviral Extortion Using Microsoft's Crypto API},
  author={Adam L. Young and Moti M. Yung},
  year={2006}
}
This chapter presents an experimental implementation of cryptoviral extortion, an attack that we devised and presented at the 1996 IEEE Symposium on Security & Privacy [16] and that was recently covered in Malicious Cryptography [17]. The design is based on Microsoft’s Cryptographic API and the salient aspects of the implementation were presented at ISC ’05 [14] and were later rened in the International Journal of Information Security [15]. Cryptoviral extortion is a 2-party protocol between an… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-5 OF 5 CITATIONS

References

Publications referenced by this paper.