Malicious cryptography exposing cryptovirology
Hackers have uncovered the dark side of cryptography-that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, d...
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, N.J. :
Wiley
c2004.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627871106719 |
Tabla de Contenidos:
- Malicious Cryptography: Exposing Cryptovirology; Contents; Foreword; Acknowledgments; Introduction; Chapter 1: Through Hacker's Eyes; Chapter 2: Cryptovirology; Chapter 3: Tools for Security and Insecurity; Chapter 4: The Two Faces of Anonymity; Chapter 5: Cryptocounters; Chapter 6: Computationally Secure Information Stealing; Chapter 7: Non-Zero Sum Games and Survivable Malware; Chapter 8: Coping with Malicious Software; Chapter 9: The Nature of Trojan Horses; Chapter 10: Subliminal Channels; Chapter 11: SETUP Attack on Factoring Based Key Generation
- Chapter 12: SETUP Attacks on Discrete-Log CryptosystemsAppendix A: Computer Virus Basics; Appendix B: Notation and Other Background Information; Appendix C: Public Key Cryptography in a Nutshell; Glossary; References; Index