Jump to ratings and reviews
Rate this book

[(Malicious Cryptography: Exposing Cryptovirology )] [Author: Adam Young] [Feb-2004]

Rate this book
This is the first book to reveal cryptography's dark side, dubbed cryptovirology–the use of cryptographic techniques to subvert computer systems Describes recent discoveries of how cryptography can be used to launch sophisticated viral payloads and provides warnings, tools, and measures for thwarting a cryptovirology attack Written by the leaders of an elite group of scientists who are seeking to expose the emerging threat of malicious cryptography and are credited with creating the term cryptovirology An ideal companion to Practical Cryptography (0-471-22357-3) and Applied Cryptography (0-471-11709-9) Endorsed by security expert Bruce Schneier

Unknown Binding

First published January 1, 2004

5 people are currently reading
92 people want to read

About the author

Adam Young

4 books1 follower

Librarian note: There are more authors in this database with this name.

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
6 (14%)
4 stars
19 (46%)
3 stars
13 (31%)
2 stars
1 (2%)
1 star
2 (4%)
Displaying 1 - 2 of 2 reviews
Profile Image for Paul Black.
315 reviews2 followers
July 18, 2024
This is an eye-opening book. The authors' goal is to improve computer security, but to do that defenders must be aware of the most subtle and insidious attacks possible. So the book focuses on how to develop computer viruses, how to keep them hidden, and how viruses (and other malware) can communicate with each other and with Evil Headquarters without being detected. Much of the content is highly technical because it is the tiny details, such as ANY bias in randomness, that are openings for exploit.

Chapter 3 is the basic computational tools for (in)security: randomness and cryptography. Chapter 4 explains how anonymity is important for freedom in the modern world, but how bad actors can misuse it. Chapter 5 is cryptocounters. How can virus software let anyone (e.g. another copy of the virus) increment or decrement a counter but the count can only be read (decrypted) with a private key? Remaining chapters are equally interesting. Assuming the operator can watch every bit of state in a computer, how can a malware writer avoid detection? How can you as an operator cope with malicious software?

Since this is now 20 years old, state of the art has surely progressed. However this book can be a good introduction to the basic if you are serious.

I picked up this book when a colleague was leaving. I read it off and on as I got time. You can probably finish this book in a month.
Displaying 1 - 2 of 2 reviews

Can't find what you're looking for?

Get help and learn more about the design.