Open Access   Article Go Back

Novel insights into Cryptovirology : A Comprehensive Study

Manas Kumar Yogi1 , S. .Lakshmi Aparna2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 1252-1255, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.12521255

Online published on Jul 31, 2018

Copyright © Manas Kumar Yogi, S. .Lakshmi Aparna . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Manas Kumar Yogi, S. .Lakshmi Aparna, “Novel insights into Cryptovirology : A Comprehensive Study,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1252-1255, 2018.

MLA Style Citation: Manas Kumar Yogi, S. .Lakshmi Aparna "Novel insights into Cryptovirology : A Comprehensive Study." International Journal of Computer Sciences and Engineering 6.7 (2018): 1252-1255.

APA Style Citation: Manas Kumar Yogi, S. .Lakshmi Aparna, (2018). Novel insights into Cryptovirology : A Comprehensive Study. International Journal of Computer Sciences and Engineering, 6(7), 1252-1255.

BibTex Style Citation:
@article{Yogi_2018,
author = {Manas Kumar Yogi, S. .Lakshmi Aparna},
title = {Novel insights into Cryptovirology : A Comprehensive Study},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1252-1255},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2594},
doi = {https://doi.org/10.26438/ijcse/v6i7.12521255}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.12521255}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2594
TI - Novel insights into Cryptovirology : A Comprehensive Study
T2 - International Journal of Computer Sciences and Engineering
AU - Manas Kumar Yogi, S. .Lakshmi Aparna
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1252-1255
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
492 383 downloads 194 downloads
  
  
           

Abstract

Cryptography is presently used for defensive purposes. Ciphers are used against passive attackers. Public key algorithms are used against an active attacker in man-in-the-middle attack. Digital signature is used for defending against a forger. E-cash systems are used against a counterfeiter and a double-spender. Pseudorandom bit generators are used against a next-bit predictor. Crypto virology is used for locating failures of protocols and vulnerabilities in design. For defending purpose Forward engineering is used.

Key-Words / Index Term

Cryptography, Cryptovirology, Public Key, Security, Cryptovirus, FIPS, PKCS

References

[1]Barth, B. California ransomware bill supported by Hollywood hospital passes committee. SC Magazine (Apr. 13, 2016).
[2] Christensen, C. The Innovator’s Solution: Creating and Sustaining Successful Growth. Harvard Business School Press, 2003.
[3] Eisler, B. Fault Line. Ballantine Books, 2009.
[4] Santayana, G. Reason in Common Sense, (1905), p. 284, volume 1 of The Life of Reason.
[5] Scott, R. Alien. 20 th Century Fox, 1979.
[6] U.S. Dept. of Health and Human Services. FACT SHEET: Ransomware and HIPAA; http://bit.ly/29zm57B
[7] Volz, D. and Auchard, E. More disruptions feared from cyber attack; Microsoft slams government secrecy. Reuters (May 15, 2017).
[8] Young, A. and Yung, M. Cryptovirology: Extortion- based security threats and countermeasures. In Proceedings of the IEEE Symposium on Security and Privacy, (1996), 129–140.
[9] Young, A. and Yung, M. Malicious cryptography— Exposing cryptovirology. Wiley, 2004.