Programming Books C Java PHP Python Learn more Browse Programming Books
Malicious Cryptography: Exposing Cryptovirology and over one million other books are available for Amazon Kindle. Learn more
Qty:1
  • List Price: $45.00
  • Save: $11.56 (26%)
FREE Shipping on orders over $35.
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
FREE Shipping on orders over $35.
Used: Good | Details
Sold by owlsbooks
Condition: Used: Good
Comment: Book is used, fast shipping and great customer service.
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Malicious Cryptography: Exposing Cryptovirology Paperback – February 27, 2004

ISBN-13: 978-0764549755 ISBN-10: 0764549758 Edition: 1st

Buy New
Price: $33.44
21 New from $18.35 27 Used from $7.00
Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$33.44
$18.35 $7.00
Year-End%20Deals%20in%20Books

Frequently Bought Together

Malicious Cryptography: Exposing Cryptovirology + The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Price for both: $43.27

Buy the selected items together
NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 416 pages
  • Publisher: Wiley; 1 edition (February 27, 2004)
  • Language: English
  • ISBN-10: 0764549758
  • ISBN-13: 978-0764549755
  • Product Dimensions: 7.4 x 0.9 x 9.2 inches
  • Shipping Weight: 1.5 pounds (View shipping rates and policies)
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (12 customer reviews)
  • Amazon Best Sellers Rank: #1,805,194 in Books (See Top 100 in Books)

Editorial Reviews

Review

“The authors of this book explain these issues and how to fight against them.” (Computer Law & Security Report, 1st September 2004)

From the Back Cover

"Tomorrow’s hackers may ransack the cryptographer’s toolkit for their own nefarious needs. From this chilling perspective, the authors make a solid scientific contribution, and tell a good story too."
–Matthew Franklin, PhD Program Chair, Crypto 2004

WHAT IF HACKERS CONTROL THE WEAPONS USED TO FIGHT THEM?

Hackers have unleashed the dark side of cryptography–that device developed to defeat Trojan horses, viruses, password theft, and other cybercrime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you’re up against and how to fight back.

They will take you inside the brilliant and devious mind of a hacker–as much an addict as the vacant-eyed denizen of the crackhouse–so you can feel the rush and recognize your opponent’s power. Then, they will arm you for the counterattack.

Cryptovirology seems like a futuristic fantasy, but be assured, the threat is ominous ly real. If you want to protect your data, your identity, and yourself, vigilance is essential–now.

  • Understand the mechanics of computationally secure information stealing
  • Learn how non-zero sum Game Theory is used to develop survivable malware
  • Discover how hackers use public key cryptography to mount extortion attacks
  • Recognize and combat the danger of kleptographic attacks on smart-card devices
  • Build a strong arsenal against a cryptovirology attack

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.2 out of 5 stars
5 star
6
4 star
2
3 star
4
2 star
0
1 star
0
See all 12 customer reviews
If you are looking for an intro to crypto, look elsewhere.
Eric Kent
Clearly the authors are very excited about the developments in cryptovirology, a relatively young field, that have taken place in the last five years.
Dr. Lee D. Carlson
One can only hope that more good guys than bad guys read this book ... or we are all in trouble.
Markus Jakobsson

Most Helpful Customer Reviews

22 of 23 people found the following review helpful By Dr. Lee D. Carlson HALL OF FAMEVINE VOICE on May 30, 2004
Format: Paperback Verified Purchase
Bypassing computer security systems has sometimes been called an art rather than a science by those who typically do not interact with computing machines at a level that would allow them to appreciate the science behind security attacks. This book does not address the strategies of how to bypass security systems, but instead concentrates on how to use cryptographic methods to corrupt the machines once access has been acquired. Clearly the authors are very excited about the developments in cryptovirology, a relatively young field, that have taken place in the last five years. Their goal though is not to train hackers to break into systems, but rather to coach the reader on how to find vulnerabilities in these systems and then repair them. The subject of cryptovirology is fascinating, especially in the mathematics that is uses, and a thorough knowledge of its power will be required for meeting the challenges of twenty-first century network computing.
After a "motivational chapter" that it meant to shed insight on what it is like to be a hacker, this being done through a collection of short stories, the authors move on to giving a general overview of the field of cryptovirology in chapter 2. The reader gets his first dose of zero-knowledge interactive proofs (ZKIPs), which allow a prover to convince a verifier of a fact without revealing to it why the fact is true. The authors point out that viruses are vulnerable once found, since their rudimentary programming can be then studied and understood. This motivates the introduction of public key cryptography into the payload of the virus, and it is at this point that the field of cryptovirology is born.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
12 of 12 people found the following review helpful By John A. Faulkner on March 31, 2004
Format: Paperback
This book presents an initial, interesting idea - could a computer virus be written that attacks a computer by encrypting the user's data? This could be a tool for extortion or a unique Denial of Service attack. Now this is not a new idea (eg: the KOH virus) but there is a new twist - the data is encoded with an asymmetric cipher, thus rendering it unrecoverable except to the virus writer. The authors state that such a virus has indeed been trialled in a proof-of-concept form, on a Macintosh SE30 (a nice machine to develop on, from memory) in System 6, so there's no "whoops, where's it gone?" problem. There is some detailed high level discussion of techniques and pitfalls. The authors then go on to describe how contemporary cryptographic technology may be adapted to the theft of information such as secure data and passwords. This is all done at the level of mathematical relationships - there is no viral code.

Two new words are added to the language - cryptovirology (the study of computer viruses with a cryptographic payload, usually malicious) and kleptography (the application of cryptography to data theft).

Here are a few chapter or section headings to give a taste of the themes running through this work: Through Hackers's Eyes; Cryptovirology; Deniable Password Snatching; Using Viruses to Steal Information; Computationally Secure Information Stealing; The Nature of Trojan Horses; Subliminal Channels.

The book starts with an accessible piece of fiction, but quickly progresses to the opaque style common to much academic writing in this field. The reader is well advised to brush up on matrix algebra, Jacobians and Abelian and non-Abelian groups and to have a working knowledge of computer viruses (however obtained).
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
9 of 11 people found the following review helpful By A Customer on May 14, 2004
Format: Paperback
For some time now we have been taught that modern cryptography offers an elegant solution to a number of problems. Communicate securely? use a VPN; identify the author of a document? use a digital signature; securely encrypt e-mail? use PKI. But what if the very power behind these solutions can itself be [misinterpreted]? If such is the case, then encryption can be a curse, a digital signature an illusion and the heralded savior an unconquerable nemesis. This is the essence of what this book is about.
To be sure this is not easy reading. It is adult material, meaning that thinking is required. But it could not be otherwise, the material would not allow it. However the reader will be well rewarded for every morsel of math they endeavor to puzzle through. The realization of the potential dark side of modern cryptography is the first step in preparing to defend against it. This book provides that realization.
The reader may find the first few chapters to be an entertaining fictional account of some days in the life of a hacker. Indeed, the text reads beautifully as such. But here is a chilling thought - what if the events described were real?
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 4 people found the following review helpful By Markus Jakobsson on March 22, 2004
Format: Paperback
This book shows what type of viruses and other malware we may expect next, and which absolutely overshadow existing threats. Can you imagine a virus that encrypts your hard drive, then blackmails you for you to be able to decrypt it? How would such a virus work, and what can you do to protect yourself? The authors are clearly knowledgeable, both in terms of cryptography and malware, and the book is interesting and accessible. One can only hope that more good guys than bad guys read this book ... or we are all in trouble.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews