Cryptovirology: extortion-based security threats and countermeasures

  title={Cryptovirology: extortion-based security threats and countermeasures},
  author={Adam L. Young and Moti Yung},
  journal={Proceedings 1996 IEEE Symposium on Security and Privacy},
  • Adam L. Young, M. Yung
  • Published 6 May 1996
  • Computer Science, Mathematics
  • Proceedings 1996 IEEE Symposium on Security and Privacy
Traditionally, cryptography and its applications are defensive in nature, and provide privacy, authentication, and security to users. In this paper we present the idea of Cryptovirology which employs a twist on cryptography, showing that it can also be used offensively. By being offensive we mean that it can be used to mount extortion based attacks that cause loss of access to information, loss of confidentiality, and information leakage, tasks which cryptography typically prevents. In this… 

Tables from this paper

Cryptovirology: Virus Approach
These attacks have implications on how the use of cryptographic tools and techniques should be audited and managed in general purpose computing environments, and imply that access to the cryptographic tools should be in well control of the system(such as API routines).
Cryptoviral Extortion: Evolution, Scenarios, and Analysis
Better understanding is given of the concept of “Cryptovirology” which presents how cryptography can also be misused in the world of cyber crime.
An Implementation of Cryptoviral Extortion Using Microsoft's Crypto API
This chapter presents an experimental implementation of cryptoviral extortion, an attack that we devised and presented at the 1996 IEEE Symposium on Security & Privacy [16] and that was recently
Deniable password snatching: on the possibility of evasive electronic espionage
  • Adam L. Young, M. Yung
  • Computer Science
    Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
  • 1997
This work presents an attack that can be mounted by a cryptotrojan that allows the attacker to gather information from a system in such a way that the attacker cannot be proven guilty beyond reasonable doubt.
White-box attack context cryptovirology
This paper presents the use of cryptographic mechanisms that are suited to the white box attack context (the attacker is supposed to have full control of the target program’s execution environment)
A Brief Survey Of Crypto Virology And Worms
The disturbing property, joined with the speed of the purported "super worms", is investigated in the present work and recommendations for countermeasures and future work are given.
Malicious cryptography - exposing cryptovirology
"Tomorrow's hackers may ransack the cryptographer's toolkit for their own nefarious needs. From this chilling perspective, the authors make a solid scientific contribution, and tell a good story
Building a Cryptovirus Using Microsoft's Cryptographic API
It is shown that by using 8 types of API calls and 72 lines of ANSI C code, the payload can hybrid encrypt sensitive data and hold it hostage on the host computer system.
Strong Cryptography Armoured Computer Viruses Forbidding Code Analysis: the Bradley Virus 1
How cryptography and key management techniques may definitively checkmate antiviral analysis and mechanisms is discussed and a generic virus, denoted bradley, is presented which protects its code with a very secure, ultra-fast symmetric encryption.
PayBreak: Defense Against Cryptographic Ransomware
The approach, prototype implementation, and evaluation of a novel, automated, and most importantly proactive defense mechanism against ransomware, called PayBreak, which effectively combats ransomware, and keeps victims' files safe.


Cryptography and Data Security
The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.
CryptoLib: Cryptography in Software
  • J. Lacy
  • Computer Science
    USENIX Security Symposium
  • 1993
CryptLib is a very portable and efficient library of routines necessary for the aforementioned cryptosystems, written entirely in C and exists under UNIX.
A method for obtaining digital signatures and public-key cryptosystems
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys.
A method for obtaining digital signatures and public-key cryptosystems
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important
On blind signatures and perfect crimes
Revokable and versatile electronic money (extended abstract)
The proposed scheme is efficient and easily extends the basic needs of a practical payment scheme to allow for coin divisibility, checks, credit card purchases and surety bonds, and is robust against problems arising from spurious equipment.
Robert Slade's guide to computer viruses - how to avoid them, how to get rid of them, and how to get help
This book discusses the history and Examples of Viral Programs, the Virus Community, and a Beginner's Panic Guide to Viral programs.
Trustee-based tracing extensions to anonymous cash and the making of anonymous change
This work introduces the first electronic cash systems which incorporate trustee-based tracing but otherwise provably protect user anonymity, and expands on the provably anonymous electronic cash svstems of TB931 and lFY921.
A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party
All shared secret or shared control schemes devised thus far are autocratic in the sense that no one can be trusted to know the secret and hence it has appeared to be impossible to construct and distribute the private pieces of information needed to realize a shared control scheme.
How To Withstand Mobile Virus Attacks
We initiate a study of distributed adversarial model of computation in which faults are non-stationary and can move through the network, analogous to a spread of a virus or a worm. We show how local