Skip to content
Scan a barcode
Scan
Paperback Malicious Cryptography: Exposing Cryptovirology Book

ISBN: 0764549758

ISBN13: 9780764549755

Malicious Cryptography: Exposing Cryptovirology

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Good*

*Best Available: (ex-library)

$19.79
Save $25.21!
List Price $45.00
Almost Gone, Only 1 Left!

Book Overview

Hackers have uncovered the dark side of cryptography--that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back. They will take you inside...

Customer Reviews

5 ratings

Excellent!!!

Malicious Cryptography: Exposing Cryptovirology is a brilliant book from two leading cryptographers. This is not for the fainthearted. If you are looking for an intro to crypto, look elsewhere. If you want cutting edge info about breaking crypto and making your crypto stronger, this is the book.

Excellent

Bypassing computer security systems has sometimes been called an art rather than a science by those who typically do not interact with computing machines at a level that would allow them to appreciate the science behind security attacks. This book does not address the strategies of how to bypass security systems, but instead concentrates on how to use cryptographic methods to corrupt the machines once access has been acquired. Clearly the authors are very excited about the developments in cryptovirology, a relatively young field, that have taken place in the last five years. Their goal though is not to train hackers to break into systems, but rather to coach the reader on how to find vulnerabilities in these systems and then repair them. The subject of cryptovirology is fascinating, especially in the mathematics that is uses, and a thorough knowledge of its power will be required for meeting the challenges of twenty-first century network computing. After a "motivational chapter" that it meant to shed insight on what it is like to be a hacker, this being done through a collection of short stories, the authors move on to giving a general overview of the field of cryptovirology in chapter 2. The reader gets his first dose of zero-knowledge interactive proofs (ZKIPs), which allow a prover to convince a verifier of a fact without revealing to it why the fact is true. The authors point out that viruses are vulnerable once found, since their rudimentary programming can be then studied and understood. This motivates the introduction of public key cryptography into the payload of the virus, and it is at this point that the field of cryptovirology is born. Chapter 3 is more of a review of modular arithmetic, entropy generators, and pseudorandom number generators and can be skipped for those readers familiar with these. The authors emphasize the need for effective random number generators and in using multiple sources for entropy generation. They also introduce the very interesting concept of a `mix network', which allows two mutually distrusting parties to communicate securely and anonymously over a network. `Onion routing' is discussed as a method for implementing asynchronous mix networks. Mix networks can be used to hide the propagation history of a worm or virus. In chapter 4, the authors discuss how to implement anonymous communication and how to launch a cryptotrojan attack that utilizes an anonymous communication channel. There are many applications of anonymous communication, one being E-money, and also, unfortunately, money laundering. The authors describe in fair detail how to conduct criminal operations with mix networks and anonymous money. This same technology though allows freedom of speech in geographical areas that are not sympathetic to it. Electronic voting, so controversial at the present time, is discussed as an activity that is very susceptible to the threat of stegotrojans or government violation of anonymity. Techniques for doing

Heaven's dark side

For some time now we have been taught that modern cryptography offers an elegant solution to a number of problems. Communicate securely? use a VPN; identify the author of a document? use a digital signature; securely encrypt e-mail? use PKI. But what if the very power behind these solutions can itself be [misinterpreted]? If such is the case, then encryption can be a curse, a digital signature an illusion and the heralded savior an unconquerable nemesis. This is the essence of what this book is about.To be sure this is not easy reading. It is adult material, meaning that thinking is required. But it could not be otherwise, the material would not allow it. However the reader will be well rewarded for every morsel of math they endeavor to puzzle through. The realization of the potential dark side of modern cryptography is the first step in preparing to defend against it. This book provides that realization.The reader may find the first few chapters to be an entertaining fictional account of some days in the life of a hacker. Indeed, the text reads beautifully as such. But here is a chilling thought - what if the events described were real?

Excellent combination of introductory and advanced material!

This is THE best book to get initiated in cryptography and virus technology. It is one of those rare works that make excellent bed-time reading, but at the same time provide state-of-the-art information that is useful (and new!) even to experienced cryptographers and practitioners. I do wish all crypto books were that much fun to read...:-)

Let's hope more good guys than bad guys read this book!

This book shows what type of viruses and other malware we may expect next, and which absolutely overshadow existing threats. Can you imagine a virus that encrypts your hard drive, then blackmails you for you to be able to decrypt it? How would such a virus work, and what can you do to protect yourself? The authors are clearly knowledgeable, both in terms of cryptography and malware, and the book is interesting and accessible. One can only hope that more good guys than bad guys read this book ... or we are all in trouble.
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured