IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 11    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 11,November 2012
A Review Report on Cryptovirology and Cryptography
Full Text(PDF, )  PP.173-176  
Author(s)
Shafiqul Abidin, Rajeev Kumar, Varun Tiwari
KEYWORDS
Cryptography, Cryptovirology, Public Key, Security, Cryptovirus, FIPS, PKCS.
ABSTRACT
Cryptography has traditionally been used for defensive purposes. Ciphers defend against a passive eavesdropper. Public key infrastructures defend against an active adversary that mounts a man-in-the-middle attack. Digital signature algorithms defend again
References
[1] Adam Young and Moti Yung, Deniable password snatching: On the possibility of Evasive Electronic Espionage, the 1997 IEEE Symposium on Security and Privacy.

[2] Cryptovirology.com FAQ. Available: http://www.cryptovirology.com/

[3] LURHQ Threat Intelligence Group, Cryzip Ransomware Trojan Analysis.Available: http://www.lurhq.com/cryzip.html

[4] Weaver, N., Potential Strategies for High Speed Active Worms: A Worst Case Analysis, http://www.cs.berkeley.edu/~nweaver/worms.pdf, last accessed on December 4, 2002.

[5] Wiley, B., Curious Yellow: The First Coordinated Worm Design,http://blanu.net/curious_yellow.html, last accessed on December 4, 2002

[6] CERT Coordination Center, CERT® Advisory CA-2002-27 Apache/mod_ssl Worm, http://www.cert.org/advisories/CA-2002- 27.html, last accessed on December 4, 2002

[7] Slashdot.org, Malicious Distributed Computing,http://slashdot.org/article.pl?sid=02/10/25/141 3220&mode=thread&tid=172, last accessed on December 4, 2002

[8] Netcraft, Netcraft Web Server Survey,http://www.netcraft.com/survey, last accessed on December 4, 2002

[9] Dabek F., Brunskill E., Frans Kaashoek M.,et. al. Building Peer-toPeer Systems with Chord, a Distributed Lookup Service, IEEE Eighth Workshop on Hot Topics in Operating Systems p. 81, Elmau, Germany, May 20 - 22, 2001.

Untitled Page