Malicious cryptography exposing cryptovirology

Hackers have uncovered the dark side of cryptography-that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, d...

Descripción completa

Detalles Bibliográficos
Autor principal: Young, Adam, 1972- (-)
Otros Autores: Yung, Moti
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, N.J. : Wiley c2004.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627871106719
Tabla de Contenidos:
  • Malicious Cryptography: Exposing Cryptovirology; Contents; Foreword; Acknowledgments; Introduction; Chapter 1: Through Hacker's Eyes; Chapter 2: Cryptovirology; Chapter 3: Tools for Security and Insecurity; Chapter 4: The Two Faces of Anonymity; Chapter 5: Cryptocounters; Chapter 6: Computationally Secure Information Stealing; Chapter 7: Non-Zero Sum Games and Survivable Malware; Chapter 8: Coping with Malicious Software; Chapter 9: The Nature of Trojan Horses; Chapter 10: Subliminal Channels; Chapter 11: SETUP Attack on Factoring Based Key Generation
  • Chapter 12: SETUP Attacks on Discrete-Log CryptosystemsAppendix A: Computer Virus Basics; Appendix B: Notation and Other Background Information; Appendix C: Public Key Cryptography in a Nutshell; Glossary; References; Index