Malicious cryptography exposing cryptovirology
Hackers have uncovered the dark side of cryptography-that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, d...
Main Author: | |
---|---|
Other Authors: | |
Format: | eBook |
Language: | Inglés |
Published: |
Hoboken, N.J. :
Wiley
c2004.
|
Edition: | 1st edition |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627871106719 |
Table of Contents:
- Malicious Cryptography: Exposing Cryptovirology; Contents; Foreword; Acknowledgments; Introduction; Chapter 1: Through Hacker's Eyes; Chapter 2: Cryptovirology; Chapter 3: Tools for Security and Insecurity; Chapter 4: The Two Faces of Anonymity; Chapter 5: Cryptocounters; Chapter 6: Computationally Secure Information Stealing; Chapter 7: Non-Zero Sum Games and Survivable Malware; Chapter 8: Coping with Malicious Software; Chapter 9: The Nature of Trojan Horses; Chapter 10: Subliminal Channels; Chapter 11: SETUP Attack on Factoring Based Key Generation
- Chapter 12: SETUP Attacks on Discrete-Log CryptosystemsAppendix A: Computer Virus Basics; Appendix B: Notation and Other Background Information; Appendix C: Public Key Cryptography in a Nutshell; Glossary; References; Index