000 02668cam a2200277 a 4500
008 091122s2004 inua b 001 0 eng
010 _a2003023863
020 _a9780764549755
035 _a(Sirsi) u2735
040 _aEG-CaNU
_cEG-CaNU
_dEG-CaNU
042 _ancode
082 0 0 _a005.82
_2 22
100 1 _aYoung, Adam,
_d 1972-
_91613
245 1 0 _aMalicious cryptography :
_b exposing cryptovirology /
_c Adam Young, Moti Yung.
260 _aHoboken, NJ :
_b Wiley,
_c c2004.
300 _axxiv, 392 p. ;
_c 24 cm.
504 _aIncludes bibliographical references (p. 357-385) and index.
505 0 _aForeword -- Acknowledgments -- Introduction -- 1 Through Hacker’s Eye -- 2 Cryptovirology -- 3 Tools for Security and Insecurity -- 4 The Two Faces of Anonymity -- 5 Cryptocounters -- 6 Computationally Secure Information Stealing -- 7 Non-Zero Sum Games and Survivable Malware -- 8 Coping with Malicious Software -- 9 The Nature of Trojan Horses -- 10 Subliminal Channels -- 11 SETUP Attack on Factoring Based Key Generation -- 12 SETUP Attacks on Discrete-Log Cryptosystems -- Appendix A: Computer Virus Basics -- Appendix B: Notation and Other Background Information -- Appendix C: Public Key Cryptography in a Nutshell -- Glossary -- References -- Index.
520 _aHackers have uncovered the dark side of cryptography--that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker--as much an addict as the vacant-eyed denizen of the crackhouse--so you can feel the rush and recognize your opponent's power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now. Understand the mechanics of computationally secure information stealing Learn how non-zero sum Game Theory is used to develop survivable malware Discover how hackers use public key cryptography to mount extortion attacks Recognize and combat the danger of kleptographic attacks on smart-card devices Build a strong arsenal against a cryptovirology attack
650 0 _aComputer security.
_95114
650 0 _aCryptography.
_9378
650 0 _aComputer viruses
_x Prevention.
_95115
650 0 _aData protection.
_95116
700 1 _aYung, Moti.
_95117
596 _a1
999 _c1802
_d1802