Jump to ratings and reviews
Rate this book

Malicious Cryptography: Exposing Cryptovirology

Rate this book
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you’re up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker—as much an addict as the vacant-eyed denizen of the crackhouse—so you can feel the rush and recognize your opponent’s power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now.

416 pages, Paperback

First published January 1, 2004

5 people are currently reading
92 people want to read

About the author

Adam Young

4 books1 follower

Librarian note: There are more authors in this database with this name.

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
6 (14%)
4 stars
19 (46%)
3 stars
13 (31%)
2 stars
1 (2%)
1 star
2 (4%)
Displaying 1 - 2 of 2 reviews
Profile Image for Paul Black.
315 reviews2 followers
July 18, 2024
This is an eye-opening book. The authors' goal is to improve computer security, but to do that defenders must be aware of the most subtle and insidious attacks possible. So the book focuses on how to develop computer viruses, how to keep them hidden, and how viruses (and other malware) can communicate with each other and with Evil Headquarters without being detected. Much of the content is highly technical because it is the tiny details, such as ANY bias in randomness, that are openings for exploit.

Chapter 3 is the basic computational tools for (in)security: randomness and cryptography. Chapter 4 explains how anonymity is important for freedom in the modern world, but how bad actors can misuse it. Chapter 5 is cryptocounters. How can virus software let anyone (e.g. another copy of the virus) increment or decrement a counter but the count can only be read (decrypted) with a private key? Remaining chapters are equally interesting. Assuming the operator can watch every bit of state in a computer, how can a malware writer avoid detection? How can you as an operator cope with malicious software?

Since this is now 20 years old, state of the art has surely progressed. However this book can be a good introduction to the basic if you are serious.

I picked up this book when a colleague was leaving. I read it off and on as I got time. You can probably finish this book in a month.
Displaying 1 - 2 of 2 reviews

Can't find what you're looking for?

Get help and learn more about the design.