Cryptography is a boon to information processing and communications as it helps to store information and
private communication securely so cryptography can be used defensively. Cryptovirology is one of the applications of
cryptography which shows that how cryptography can be used offensively. Offensive means it attacks on system due to
which information leakage, loss of confidentiality can occur. In these powerful attacks attacker encrypts the victim’s data,
asks for ransom and release data after hostage. This paper will introduce you with cryptovirological attacks and its types in
detail. This paper will also suggest some countermeasures to prevent your system from such attacks.
Published In:IJCSN Journal Volume 7, Issue 2
Date of Publication : April 2018
Pages : 74-78
Figures :06
Tables : --
Payal Jain : Department of Computer Science and Engineering,
MGM’s Jawaharlal Nehru Engineering College,
Aurangabad, Maharashtra, India.
Kanchan Vaishnav : Department of Computer Science and Engineering,
MGM’s Jawaharlal Nehru Engineering College
Aurangabad, Maharashtra, India.
It is demonstrated that how Cryptography can be used to
build the malicious software programs that can be used
in extortion-based attacks on computer system. Publickey
cryptography is necessary for the attacker to take
advantage over the owner of infected system. Also
presented a set of measures that can be taken to
minimize the risks of attack posed by the
cryptovirology. We can conclude that from all these
attacks that auditing and logging tools may inadequate
for the law enforcement purposes against the attacker.
[1] Shivale Saurabh Anandrao,“Cryptovirology:
Virus Approach”,International Journal of Network
Security & its Application(IJNSA), Vol. 3, No. 4, July
2011.
[2] www.tothenew.com
[3] S. Manoj Kumar, M. Ravi Kumar,“Cryptoviral
Extortion: A Virus Based Approach”, International
Journal of Computer Trends and Technology (IJCTT),
volume 4, Issue 5–May.
[4] www.heimdalsecurity.com
[5] www.cyberbit.com
[6] S. Mahmudha Fasheem, P. Kanimozhi, B. Akora
Murthy, “Detection and Avoidance of Ransomware”,
2017 IJEDR | Volume 5, Issue 1 | ISSN: 2321-9939.
[7] Nolen Scaife, Henry carter, Patrick Traynor, Kevin
R.B. Butler, “CryptoLock (and Drop It): Stopping
Ransomware Attacks on User Data”, 2016 IEEE 36th
International Conference on Distributed
Computing Systems.