Novel insights into Cryptovirology : A Comprehensive Study
Manas Kumar Yogi1 , S. .Lakshmi Aparna2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-7 , Page no. 1252-1255, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12521255
Online published on Jul 31, 2018
Copyright © Manas Kumar Yogi, S. .Lakshmi Aparna . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Manas Kumar Yogi, S. .Lakshmi Aparna, “Novel insights into Cryptovirology : A Comprehensive Study,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1252-1255, 2018.
MLA Style Citation: Manas Kumar Yogi, S. .Lakshmi Aparna "Novel insights into Cryptovirology : A Comprehensive Study." International Journal of Computer Sciences and Engineering 6.7 (2018): 1252-1255.
APA Style Citation: Manas Kumar Yogi, S. .Lakshmi Aparna, (2018). Novel insights into Cryptovirology : A Comprehensive Study. International Journal of Computer Sciences and Engineering, 6(7), 1252-1255.
BibTex Style Citation:
@article{Yogi_2018,
author = {Manas Kumar Yogi, S. .Lakshmi Aparna},
title = {Novel insights into Cryptovirology : A Comprehensive Study},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1252-1255},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2594},
doi = {https://doi.org/10.26438/ijcse/v6i7.12521255}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.12521255}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2594
TI - Novel insights into Cryptovirology : A Comprehensive Study
T2 - International Journal of Computer Sciences and Engineering
AU - Manas Kumar Yogi, S. .Lakshmi Aparna
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1252-1255
IS - 7
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
492 | 383 downloads | 194 downloads |
Abstract
Cryptography is presently used for defensive purposes. Ciphers are used against passive attackers. Public key algorithms are used against an active attacker in man-in-the-middle attack. Digital signature is used for defending against a forger. E-cash systems are used against a counterfeiter and a double-spender. Pseudorandom bit generators are used against a next-bit predictor. Crypto virology is used for locating failures of protocols and vulnerabilities in design. For defending purpose Forward engineering is used.
Key-Words / Index Term
Cryptography, Cryptovirology, Public Key, Security, Cryptovirus, FIPS, PKCS
References
[1]Barth, B. California ransomware bill supported by Hollywood hospital passes committee. SC Magazine (Apr. 13, 2016).
[2] Christensen, C. The Innovator’s Solution: Creating and Sustaining Successful Growth. Harvard Business School Press, 2003.
[3] Eisler, B. Fault Line. Ballantine Books, 2009.
[4] Santayana, G. Reason in Common Sense, (1905), p. 284, volume 1 of The Life of Reason.
[5] Scott, R. Alien. 20 th Century Fox, 1979.
[6] U.S. Dept. of Health and Human Services. FACT SHEET: Ransomware and HIPAA; http://bit.ly/29zm57B
[7] Volz, D. and Auchard, E. More disruptions feared from cyber attack; Microsoft slams government secrecy. Reuters (May 15, 2017).
[8] Young, A. and Yung, M. Cryptovirology: Extortion- based security threats and countermeasures. In Proceedings of the IEEE Symposium on Security and Privacy, (1996), 129–140.
[9] Young, A. and Yung, M. Malicious cryptography— Exposing cryptovirology. Wiley, 2004.