Corpus ID: 15969555

An Implementation of Cryptoviral Extortion Using Microsoft's Crypto API

@inproceedings{Young2006AnIO,
  title={An Implementation of Cryptoviral Extortion Using Microsoft's Crypto API},
  author={A. Young and M. Yung},
  year={2006}
}
This chapter presents an experimental implementation of cryptoviral extortion, an attack that we devised and presented at the 1996 IEEE Symposium on Security & Privacy [16] and that was recently covered in Malicious Cryptography [17]. The design is based on Microsoft’s Cryptographic API and the salient aspects of the implementation were presented at ISC ’05 [14] and were later rened in the International Journal of Information Security [15]. Cryptoviral extortion is a 2-party protocol between an… Expand
9 Citations
Cryptovirology: Virus Approach
  • 6
  • PDF
PayBreak: Defense Against Cryptographic Ransomware
  • 106
  • PDF
Ransomware Analysis and Defense-WannaCry and the Win32 environment
  • 2
Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation)
  • 9
Ransomware Network Traffic Analysis for Pre-encryption Alert
  • 1
  • PDF
Vulnerability Analysis on the CNG Crypto Library
  • Kyungroul Lee, I. You, Kangbin Yim
  • Computer Science
  • 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
  • 2015
  • 3

References

SHOWING 1-10 OF 25 REFERENCES
Cryptovirology: extortion-based security threats and countermeasures
  • A. Young, M. Yung
  • Computer Science
  • Proceedings 1996 IEEE Symposium on Security and Privacy
  • 1996
  • 173
  • PDF
Cryptoviral extortion using Microsoft's Crypto API
  • A. Young
  • Computer Science
  • International Journal of Information Security
  • 2006
  • 29
Building a Cryptovirus Using Microsoft's Cryptographic API
  • 12
Malicious cryptography - exposing cryptovirology
  • 135
  • PDF
OAEP Reconsidered
  • 439
  • PDF
A method for obtaining digital signatures and public-key cryptosystems
  • 7,223
  • PDF
On the security of multiple encryption
  • 227
  • PDF
Optimal Asymmetric Encryption
  • 909
  • PDF
RSA-OAEP Is Secure under the RSA Assumption
  • 390
  • PDF
Random oracles are practical: a paradigm for designing efficient protocols
  • 4,572
  • PDF
...
1
2
3
...