Cryptovirology - by Malathi


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cryptovirology - by Malathi

  1. 1. CRYPTOVIROLOGY. the use of cryptography in virus attacks “ Extortion based security threats” Seminar by: MALATHI.R.S 1
  2. 2. Cryptography <ul><li>Derived from Greek language where kryptó stands for &quot;hidden&quot; and gráfo stands for &quot;to write&quot;. </li></ul><ul><li>Practice and study of modifying information so that it becomes unintelligible. </li></ul>
  3. 3. Types of Encryption Symmetric Key Encryption Public Key Encryption
  4. 4. Virology <ul><li>Study of : </li></ul><ul><ul><li>Creation </li></ul></ul><ul><ul><li>Duplication </li></ul></ul><ul><ul><li>Propagation of Viruses. </li></ul></ul>
  5. 5. Cryptovirology <ul><li>What is it??? </li></ul><ul><li>Application of paradigms of cryptography in creation of deadly viruses. </li></ul>
  6. 6. Types of viruses <ul><li>Virus – Malicious piece of code that copies itself and infect a computer without permission or knowledge of the user. </li></ul><ul><li>Trojan – Program within another program executing commands Program within another program executing commands without the owner’s knowledge. </li></ul><ul><li>Worms – Worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes. </li></ul>
  7. 7. Types of viruses <ul><li>Spyware – computer software that is installed on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent. </li></ul><ul><li>Adware – Advertising supported software which spies on the users to know about their likes and dislikes. </li></ul>
  8. 8. Havocs caused by viruses <ul><li>Deletes valuable data </li></ul><ul><li>Consumes CPU cycles </li></ul><ul><li>Uses up memory and other resources. </li></ul><ul><li>Infects system files. </li></ul><ul><li>Could sometimes cause hardware damage also. </li></ul>
  9. 9. Charateristics of a cryptovirus <ul><li>Virus itself is encrypted, which makes detecting the virus very difficult. </li></ul><ul><li>Immunity to detection by virus signatures. </li></ul><ul><li>Encrypted communication between the virus and its author. </li></ul><ul><li>High survivability of virus </li></ul>
  10. 10. Typical cryptoviral attack <ul><li>Cryptovirus attaches itself to some data. </li></ul><ul><li>Encrypts that data using Symmetric key. </li></ul><ul><li>Encrypts the symmetric key using public key of author </li></ul><ul><li>Encrypts that data using its public key. </li></ul><ul><li>Puts the data up for ransom. </li></ul><ul><li>The victim may either choose to pay the ransom money or lose the data. </li></ul>
  11. 11. Possible Counter Measures <ul><li>Update all software's like operating system, drivers all software's that use the internet and update anti virus and anti spyware </li></ul><ul><li>Install inbound and outbound firewall </li></ul><ul><li>Encrypt important data </li></ul><ul><li>Backup the data regularly </li></ul><ul><li>Disable auto run feature in XP </li></ul><ul><li>Hope antivirus vendors find a cure for it in near future </li></ul>
  12. 12. Conclusion <ul><li>Cryptography with virology is a deadly combination. </li></ul><ul><li>The battle between Virus writers and anti virus vendors is raging hard </li></ul><ul><li>The use of cryptography in virology is one such tool used by virus writers to win the battle </li></ul><ul><li>Anti-virus vendors do not have any answer for such threats as of now and they may come up with remedies. </li></ul><ul><li>The cycle continues…… </li></ul>
  13. 13. Thank you