Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Malicious Cryptography: Exposing Cryptovirology 1st Edition

4.2 out of 5 stars 12 customer reviews
ISBN-13: 978-0764549755
ISBN-10: 0764549758
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$3.07 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$33.96 On clicking this link, a new layer will be open
More Buying Choices
31 New from $18.38 23 Used from $3.07 1 Collectible from $29.00
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Save Up to 90% on Textbooks Textbooks
$33.96 FREE Shipping on orders over $35. In Stock. Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

  • Malicious Cryptography: Exposing Cryptovirology
  • +
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Total price: $63.93
Buy the selected items together

Editorial Reviews

Review

“The authors of this book explain these issues and how to fight against them.” (Computer Law & Security Report, 1st September 2004)

From the Back Cover

"Tomorrow’s hackers may ransack the cryptographer’s toolkit for their own nefarious needs. From this chilling perspective, the authors make a solid scientific contribution, and tell a good story too."
–Matthew Franklin, PhD Program Chair, Crypto 2004

WHAT IF HACKERS CONTROL THE WEAPONS USED TO FIGHT THEM?

Hackers have unleashed the dark side of cryptography–that device developed to defeat Trojan horses, viruses, password theft, and other cybercrime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you’re up against and how to fight back.

They will take you inside the brilliant and devious mind of a hacker–as much an addict as the vacant-eyed denizen of the crackhouse–so you can feel the rush and recognize your opponent’s power. Then, they will arm you for the counterattack.

Cryptovirology seems like a futuristic fantasy, but be assured, the threat is ominous ly real. If you want to protect your data, your identity, and yourself, vigilance is essential–now.

  • Understand the mechanics of computationally secure information stealing
  • Learn how non-zero sum Game Theory is used to develop survivable malware
  • Discover how hackers use public key cryptography to mount extortion attacks
  • Recognize and combat the danger of kleptographic attacks on smart-card devices
  • Build a strong arsenal against a cryptovirology attack
NO_CONTENT_IN_FEATURE



Product Details

  • Paperback: 416 pages
  • Publisher: Wiley; 1 edition (February 27, 2004)
  • Language: English
  • ISBN-10: 0764549758
  • ISBN-13: 978-0764549755
  • Product Dimensions: 7.4 x 0.9 x 9.2 inches
  • Shipping Weight: 1.5 pounds (View shipping rates and policies)
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (12 customer reviews)
  • Amazon Best Sellers Rank: #1,210,050 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Top Customer Reviews

Format: Paperback Verified Purchase
Bypassing computer security systems has sometimes been called an art rather than a science by those who typically do not interact with computing machines at a level that would allow them to appreciate the science behind security attacks. This book does not address the strategies of how to bypass security systems, but instead concentrates on how to use cryptographic methods to corrupt the machines once access has been acquired. Clearly the authors are very excited about the developments in cryptovirology, a relatively young field, that have taken place in the last five years. Their goal though is not to train hackers to break into systems, but rather to coach the reader on how to find vulnerabilities in these systems and then repair them. The subject of cryptovirology is fascinating, especially in the mathematics that is uses, and a thorough knowledge of its power will be required for meeting the challenges of twenty-first century network computing.
After a "motivational chapter" that it meant to shed insight on what it is like to be a hacker, this being done through a collection of short stories, the authors move on to giving a general overview of the field of cryptovirology in chapter 2. The reader gets his first dose of zero-knowledge interactive proofs (ZKIPs), which allow a prover to convince a verifier of a fact without revealing to it why the fact is true. The authors point out that viruses are vulnerable once found, since their rudimentary programming can be then studied and understood. This motivates the introduction of public key cryptography into the payload of the virus, and it is at this point that the field of cryptovirology is born.
Read more ›
Comment 23 of 24 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This book presents an initial, interesting idea - could a computer virus be written that attacks a computer by encrypting the user's data? This could be a tool for extortion or a unique Denial of Service attack. Now this is not a new idea (eg: the KOH virus) but there is a new twist - the data is encoded with an asymmetric cipher, thus rendering it unrecoverable except to the virus writer. The authors state that such a virus has indeed been trialled in a proof-of-concept form, on a Macintosh SE30 (a nice machine to develop on, from memory) in System 6, so there's no "whoops, where's it gone?" problem. There is some detailed high level discussion of techniques and pitfalls. The authors then go on to describe how contemporary cryptographic technology may be adapted to the theft of information such as secure data and passwords. This is all done at the level of mathematical relationships - there is no viral code.

Two new words are added to the language - cryptovirology (the study of computer viruses with a cryptographic payload, usually malicious) and kleptography (the application of cryptography to data theft).

Here are a few chapter or section headings to give a taste of the themes running through this work: Through Hackers's Eyes; Cryptovirology; Deniable Password Snatching; Using Viruses to Steal Information; Computationally Secure Information Stealing; The Nature of Trojan Horses; Subliminal Channels.

The book starts with an accessible piece of fiction, but quickly progresses to the opaque style common to much academic writing in this field. The reader is well advised to brush up on matrix algebra, Jacobians and Abelian and non-Abelian groups and to have a working knowledge of computer viruses (however obtained).
Read more ›
Comment 13 of 13 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
By A Customer on May 14, 2004
Format: Paperback
For some time now we have been taught that modern cryptography offers an elegant solution to a number of problems. Communicate securely? use a VPN; identify the author of a document? use a digital signature; securely encrypt e-mail? use PKI. But what if the very power behind these solutions can itself be [misinterpreted]? If such is the case, then encryption can be a curse, a digital signature an illusion and the heralded savior an unconquerable nemesis. This is the essence of what this book is about.
To be sure this is not easy reading. It is adult material, meaning that thinking is required. But it could not be otherwise, the material would not allow it. However the reader will be well rewarded for every morsel of math they endeavor to puzzle through. The realization of the potential dark side of modern cryptography is the first step in preparing to defend against it. This book provides that realization.
The reader may find the first few chapters to be an entertaining fictional account of some days in the life of a hacker. Indeed, the text reads beautifully as such. But here is a chilling thought - what if the events described were real?
Comment 10 of 12 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This book shows what type of viruses and other malware we may expect next, and which absolutely overshadow existing threats. Can you imagine a virus that encrypts your hard drive, then blackmails you for you to be able to decrypt it? How would such a virus work, and what can you do to protect yourself? The authors are clearly knowledgeable, both in terms of cryptography and malware, and the book is interesting and accessible. One can only hope that more good guys than bad guys read this book ... or we are all in trouble.
Comment 4 of 4 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Recent Customer Reviews

Set up an Amazon Giveaway

Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more
Malicious Cryptography: Exposing Cryptovirology
This item: Malicious Cryptography: Exposing Cryptovirology
Price: $33.96
Ships from and sold by Amazon.com
Want to discover more products? Check out this page to see more: computer security