Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Cryptovirology: Malicious Cryptography Ransomware Based Approach  
  Authors : Payal Jain; Kanchan Vaishnav
  Cite as:

 

Cryptography is a boon to information processing and communications as it helps to store information and private communication securely so cryptography can be used defensively. Cryptovirology is one of the applications of cryptography which shows that how cryptography can be used offensively. Offensive means it attacks on system due to which information leakage, loss of confidentiality can occur. In these powerful attacks attacker encrypts the victim’s data, asks for ransom and release data after hostage. This paper will introduce you with cryptovirological attacks and its types in detail. This paper will also suggest some countermeasures to prevent your system from such attacks.

 

Published In : IJCSN Journal Volume 7, Issue 2

Date of Publication : April 2018

Pages : 74-78

Figures :06

Tables : --

 

Payal Jain : Department of Computer Science and Engineering, MGM’s Jawaharlal Nehru Engineering College, Aurangabad, Maharashtra, India.

Kanchan Vaishnav : Department of Computer Science and Engineering, MGM’s Jawaharlal Nehru Engineering College Aurangabad, Maharashtra, India.

 

Malicious, Cryptovirology, Cryptography, Public-key cryptography, Ransomware, GPcode, Security, attack

It is demonstrated that how Cryptography can be used to build the malicious software programs that can be used in extortion-based attacks on computer system. Publickey cryptography is necessary for the attacker to take advantage over the owner of infected system. Also presented a set of measures that can be taken to minimize the risks of attack posed by the cryptovirology. We can conclude that from all these attacks that auditing and logging tools may inadequate for the law enforcement purposes against the attacker.

 

[1] Shivale Saurabh Anandrao,“Cryptovirology: Virus Approach”,International Journal of Network Security & its Application(IJNSA), Vol. 3, No. 4, July 2011. [2] www.tothenew.com [3] S. Manoj Kumar, M. Ravi Kumar,“Cryptoviral Extortion: A Virus Based Approach”, International Journal of Computer Trends and Technology (IJCTT), volume 4, Issue 5–May. [4] www.heimdalsecurity.com [5] www.cyberbit.com [6] S. Mahmudha Fasheem, P. Kanimozhi, B. Akora Murthy, “Detection and Avoidance of Ransomware”, 2017 IJEDR | Volume 5, Issue 1 | ISSN: 2321-9939. [7] Nolen Scaife, Henry carter, Patrick Traynor, Kevin R.B. Butler, “CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data”, 2016 IEEE 36th International Conference on Distributed Computing Systems.