cryptovirology - by malathi
Post on 21-Dec-2014
1.094 Views
Preview:
DESCRIPTION
TRANSCRIPT
11
CRYPTOVIROLOGY.CRYPTOVIROLOGY. the use of cryptography in virus the use of cryptography in virus
attacksattacks
““Extortion based security threats”Extortion based security threats”
Seminar by:Seminar by:MALATHI.R.SMALATHI.R.S
22
CryptographyCryptography
Derived from Greek language where Derived from Greek language where kryptókryptó stands for "hidden" and stands for "hidden" and gráfográfo stands for "to write".stands for "to write".
Practice and study of modifying Practice and study of modifying information so that it becomes information so that it becomes unintelligible.unintelligible.
33
Types of EncryptionTypes of Encryption
Symmetric Key Encryption Public Key Encryption
44
VirologyVirology
Study of :Study of :– CreationCreation– DuplicationDuplication– Propagation of Viruses.Propagation of Viruses.
55
CryptovirologyCryptovirology
What is it???What is it??? Application of paradigms of Application of paradigms of
cryptography in creation of deadly cryptography in creation of deadly viruses.viruses.
66
Types of virusesTypes of viruses
Virus – Malicious piece of code that copies Virus – Malicious piece of code that copies itself and infect a computer without itself and infect a computer without permission or knowledge of the user.permission or knowledge of the user.
Trojan – Program within another program Trojan – Program within another program executing commands Program within executing commands Program within another program executing commands another program executing commands without the owner’s knowledge.without the owner’s knowledge.
Worms – Worm is a self-replicating Worms – Worm is a self-replicating computer program. It uses a network to computer program. It uses a network to send copies of itself to other nodes.send copies of itself to other nodes.
77
Types of virusesTypes of viruses
Spyware – computer software that is Spyware – computer software that is installed on a personal computer to installed on a personal computer to intercept or take partial control over intercept or take partial control over the user's interaction with the the user's interaction with the computer, without the user's computer, without the user's informed consent.informed consent.
Adware – Advertising supported Adware – Advertising supported software which spies on the users to software which spies on the users to know about their likes and dislikes. know about their likes and dislikes.
88
Havocs caused by virusesHavocs caused by viruses
Deletes valuable dataDeletes valuable data Consumes CPU cyclesConsumes CPU cycles Uses up memory and other Uses up memory and other
resources.resources. Infects system files.Infects system files. Could sometimes cause hardware Could sometimes cause hardware
damage also. damage also.
99
Charateristics of a cryptovirusCharateristics of a cryptovirus
Virus itself is encrypted, which Virus itself is encrypted, which makes detecting the virus very makes detecting the virus very difficult.difficult.
Immunity to detection by virus Immunity to detection by virus signatures.signatures.
Encrypted communication between Encrypted communication between the virus and its author.the virus and its author.
High survivability of virusHigh survivability of virus
1010
Typical cryptoviral attackTypical cryptoviral attack
Cryptovirus attaches itself to some data.Cryptovirus attaches itself to some data. Encrypts that data using Symmetric key.Encrypts that data using Symmetric key. Encrypts the symmetric key using public Encrypts the symmetric key using public
key of authorkey of author Encrypts that data using its public key.Encrypts that data using its public key. Puts the data up for ransom.Puts the data up for ransom. The victim may either choose to pay the The victim may either choose to pay the
ransom money or lose the data.ransom money or lose the data.
1111
Possible Counter MeasuresPossible Counter Measures Update all software's like operating system, Update all software's like operating system,
drivers all software's that use the internet and drivers all software's that use the internet and update anti virus and anti spywareupdate anti virus and anti spyware
Install inbound and outbound firewallInstall inbound and outbound firewall Encrypt important dataEncrypt important data Backup the data regularlyBackup the data regularly Disable auto run feature in XPDisable auto run feature in XP Hope antivirus vendors find a cure for it in near Hope antivirus vendors find a cure for it in near
future future
1212
ConclusionConclusion
Cryptography with virology is a deadly Cryptography with virology is a deadly combination.combination.
The battle between Virus writers and anti The battle between Virus writers and anti virus vendors is raging hardvirus vendors is raging hard
The use of cryptography in virology is one The use of cryptography in virology is one such tool used by virus writers to win the such tool used by virus writers to win the battlebattle
Anti-virus vendors do not have any answer Anti-virus vendors do not have any answer for such threats as of now and they may for such threats as of now and they may come up with remedies.come up with remedies.
The cycle continues……The cycle continues……
1313
top related