Home Page Icon
Home Page
Table of Contents for
Cover Page
Close
Cover Page
by Moti Yung, Adam Young
Malicious Cryptography: Exposing Cryptovirology
Cover Page
Title Page
Copyright
Dedication
Contents
Foreword
Acknowledgments
Introduction
Chapter 1: Through Hacker's Eyes
Chapter 2: Cryptovirology
Chapter 3: Tools for Security and Insecurity
3.1 Sources of Entropy
3.2 Entropy Extraction via Hashing
3.3 Unbiasing a Biased Coin
3.4 Combining Weak Sources of Entropy
3.5 Pseudorandom Number Generators
3.6 Uniform Sampling
3.7 Random Permutation Generation
3.8 Sound Approach to Random Number Generation and Use
3.9 RNGs Are the Beating Heart of System Security
3.10 Cryptovirology Benefits from General Advances
3.11 Anonymizing Program Propagation
Chapter 4: The Two Faces of Anonymity
4.1 Anonymity in a Digital Age
4.2 Deniable Password Snatching
Chapter 5: Cryptocounters
5.1 Overview of Cryptocounters
5.2 Implementing Cryptocounters
5.3 Other Approaches to Cryptocounters
Chapter 6: Computationally Secure Information Stealing
6.1 Using Viruses to Steal Information
6.2 Private Information Retrieval
6.3 A Variant of the Phi-Hiding Scheme
6.4 Tagged Private Information Retrieval
6.5 Secure Information Stealing Malware
6.6 Deniable Password Snatching Based on Phi-Hiding
6.7 Malware Loaders
6.8 Cryptographic Computing
Chapter 7: Non-Zero Sum Games and Survivable Malware
7.1 Survivable Malware
7.2 Elements of Game Theory
7.3 Attacking a Brokerage Firm
7.4 Other Two-Player Game Attacks
7.5 Future Possibilities
Chapter 8: Coping with Malicious Software
8.1 Undecidability of Virus Detection
8.2 Virus Identification and Obfuscation
8.3 Heuristic Virus Detection
8.4 Change Detection
Chapter 9: The Nature of Trojan Horses
9.1 Text Editor Trojan Horse
9.2 Salami Slicing Attacks
9.3 Thompson's Password Snatcher
9.4 The Subtle Nature of Trojan Horses
Chapter 10: Subliminal Channels
10.1 Brief History of Subliminal Channels
10.2 The Difference Between a Subliminal and a Covert Channel
10.3 The Prisoner's Problem of Gustavus Simmons
10.4 Subliminal Channels New and Old
10.5 The Impact of Subliminal Channels on Key Escrow
Chapter 11: SETUP Attack on Factoring Based Key Generation
11.1 Honest Composite Key Generation
11.2 Weak Backdoor Attacks on Composite Key Generation
11.3 Probabilistic Bias Removal Method
11.4 Secretly Embedded Trapdoors
11.5 Key Generation SETUP Attack
11.6 Security of the SETUP Attack
11.7 Detecting the Attack in Code Reviews
11.8 Countering the SETUP Attack
11.9 Thinking Outside the Box
11.10 The Isaac Newton Institute Lecture
Chapter 12: SETUP Attacks on Discrete-Log Cryptosystems
12.1 The Discrete-Log SETUP Primitive
12.2 Diffie-Hellman SETUP Attack
12.3 Security of the Diffie-Hellman SETUP Attack
12.4 Intuition Behind the Attack
12.5 Kleptogram Attack Methodology
12.6 PKCS SETUP Attacks
12.7 SETUP Attacks on Digital Signature Algorithms
12.8 Rogue Use of DSA for Encryption
12.9 Other Work in Kleptography
12.10 Should You Trust Your Smart Card?
Appendix A: Computer Virus Basics
A.1 Origins of Malicious Software
A.2 Trojans, Viruses, and Worms: What Is the Difference?
A.3 A Simple DOS COM Infector
A.4 Viruses Don't Have to Gain Control Before the Host
Appendix B: Notation and Other Background Information
B.1 Notation Used Throughout the Book
B.2 Basic Facts from Number Theory and Algorithmics
B.3 Intractability: Malware's Biggest Ally
B.4 Random Oracles and Functions
Appendix C: Public Key Cryptography in a Nutshell
C.1 Overview of Cryptography
C.2 Discrete-Log Based Cryptosystems
Glossary
References
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Title Page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset