cryptovirology - by malathi

13
1 CRYPTOVIROLOGY. CRYPTOVIROLOGY. the use of the use of cryptography in virus attacks cryptography in virus attacks Extortion based security threats” Extortion based security threats” Seminar by: Seminar by: MALATHI.R.S MALATHI.R.S

Upload: santhosh-sundar

Post on 21-Dec-2014

1.094 views

Category:

Technology


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Cryptovirology - by Malathi

11

CRYPTOVIROLOGY.CRYPTOVIROLOGY. the use of cryptography in virus the use of cryptography in virus

attacksattacks

““Extortion based security threats”Extortion based security threats”

Seminar by:Seminar by:MALATHI.R.SMALATHI.R.S

Page 2: Cryptovirology - by Malathi

22

CryptographyCryptography

Derived from Greek language where Derived from Greek language where kryptókryptó stands for "hidden" and stands for "hidden" and gráfográfo stands for "to write".stands for "to write".

Practice and study of modifying Practice and study of modifying information so that it becomes information so that it becomes unintelligible.unintelligible.

Page 3: Cryptovirology - by Malathi

33

Types of EncryptionTypes of Encryption

Symmetric Key Encryption Public Key Encryption

Page 4: Cryptovirology - by Malathi

44

VirologyVirology

Study of :Study of :– CreationCreation– DuplicationDuplication– Propagation of Viruses.Propagation of Viruses.

Page 5: Cryptovirology - by Malathi

55

CryptovirologyCryptovirology

What is it???What is it??? Application of paradigms of Application of paradigms of

cryptography in creation of deadly cryptography in creation of deadly viruses.viruses.

Page 6: Cryptovirology - by Malathi

66

Types of virusesTypes of viruses

Virus – Malicious piece of code that copies Virus – Malicious piece of code that copies itself and infect a computer without itself and infect a computer without permission or knowledge of the user.permission or knowledge of the user.

Trojan – Program within another program Trojan – Program within another program executing commands Program within executing commands Program within another program executing commands another program executing commands without the owner’s knowledge.without the owner’s knowledge.

Worms – Worm is a self-replicating Worms – Worm is a self-replicating computer program. It uses a network to computer program. It uses a network to send copies of itself to other nodes.send copies of itself to other nodes.

Page 7: Cryptovirology - by Malathi

77

Types of virusesTypes of viruses

Spyware – computer software that is Spyware – computer software that is installed on a personal computer to installed on a personal computer to intercept or take partial control over intercept or take partial control over the user's interaction with the the user's interaction with the computer, without the user's computer, without the user's informed consent.informed consent.

Adware – Advertising supported Adware – Advertising supported software which spies on the users to software which spies on the users to know about their likes and dislikes. know about their likes and dislikes.

Page 8: Cryptovirology - by Malathi

88

Havocs caused by virusesHavocs caused by viruses

Deletes valuable dataDeletes valuable data Consumes CPU cyclesConsumes CPU cycles Uses up memory and other Uses up memory and other

resources.resources. Infects system files.Infects system files. Could sometimes cause hardware Could sometimes cause hardware

damage also. damage also.

Page 9: Cryptovirology - by Malathi

99

Charateristics of a cryptovirusCharateristics of a cryptovirus

Virus itself is encrypted, which Virus itself is encrypted, which makes detecting the virus very makes detecting the virus very difficult.difficult.

Immunity to detection by virus Immunity to detection by virus signatures.signatures.

Encrypted communication between Encrypted communication between the virus and its author.the virus and its author.

High survivability of virusHigh survivability of virus

Page 10: Cryptovirology - by Malathi

1010

Typical cryptoviral attackTypical cryptoviral attack

Cryptovirus attaches itself to some data.Cryptovirus attaches itself to some data. Encrypts that data using Symmetric key.Encrypts that data using Symmetric key. Encrypts the symmetric key using public Encrypts the symmetric key using public

key of authorkey of author Encrypts that data using its public key.Encrypts that data using its public key. Puts the data up for ransom.Puts the data up for ransom. The victim may either choose to pay the The victim may either choose to pay the

ransom money or lose the data.ransom money or lose the data.

Page 11: Cryptovirology - by Malathi

1111

Possible Counter MeasuresPossible Counter Measures Update all software's like operating system, Update all software's like operating system,

drivers all software's that use the internet and drivers all software's that use the internet and update anti virus and anti spywareupdate anti virus and anti spyware

Install inbound and outbound firewallInstall inbound and outbound firewall Encrypt important dataEncrypt important data Backup the data regularlyBackup the data regularly Disable auto run feature in XPDisable auto run feature in XP Hope antivirus vendors find a cure for it in near Hope antivirus vendors find a cure for it in near

future future

Page 12: Cryptovirology - by Malathi

1212

ConclusionConclusion

Cryptography with virology is a deadly Cryptography with virology is a deadly combination.combination.

The battle between Virus writers and anti The battle between Virus writers and anti virus vendors is raging hardvirus vendors is raging hard

The use of cryptography in virology is one The use of cryptography in virology is one such tool used by virus writers to win the such tool used by virus writers to win the battlebattle

Anti-virus vendors do not have any answer Anti-virus vendors do not have any answer for such threats as of now and they may for such threats as of now and they may come up with remedies.come up with remedies.

The cycle continues……The cycle continues……

Page 13: Cryptovirology - by Malathi

1313