Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Young, Adam, 1972- author.

Title Malicious cryptography : exposing cryptovirology / Adam Young, Moti Yung. [O'Reilly electronic resource]

Publication Info. ©2004
Indianapolis, Indiana : Wiley Publishing, [2004]
QR Code
Description 1 online resource (1 volume) : illustrations
Bibliography Includes bibliographical references and index.
Contents Through hacker's eyes -- Cryptovirology -- Tools for security and insecurity -- The two faces of anonymity -- Cryptocounters -- Computationally secure information stealing -- Non-zero sum games and survivable malware -- Coping with malicious software -- The nature of Trojan horses -- Subliminal channels -- SETUP attack on factoring based key generation -- SETUP attacks on discrete-log cryptosystems.
Summary Annotation Hackers have uncovered the dark side of cryptography--that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you're up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker--as much an addict as the vacant-eyed denizen of the crackhouse--so you can feel the rush and recognize your opponent's power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now. <ul><li>Understand the mechanics of computationally secure information stealing</li><li>Learn how non-zero sum Game Theory is used to develop survivable malware</li><li>Discover how hackers use public key cryptography to mount extortion attacks</li><li>Recognize and combat the danger of kleptographic attacks on smart-card devices</li><li>Build a strong arsenal against a cryptovirology attack</li></ul>
Subject Computer security.
Cryptography.
Computer viruses -- Prevention.
Data protection.
Sécurité informatique.
Cryptographie.
Protection de l'information (Informatique)
Computer security
Computer viruses -- Prevention
Cryptography
Data protection
Added Author Yung, Moti, author.
Other Form: Print version: Young, Adam, 1972- Malicious cryptography. Hoboken, NJ : Wiley, ©2004 0764549758 (DLC) 2003023863 (OCoLC)53330886
ISBN 9780764568466
0764568469
0764549758
9780764549755
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information