Building a cryptovirus using Microsoft's Cryptographic API

被引:0
作者
Young, AL
机构
来源
INFORMATION SECURITY, PROCEEDINGS | 2005年 / 3650卷
关键词
cryptovirus; hybrid encryption; public key cryptography; RSA; symmetric cryptography; MS CAPI; hash function; mix networks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents the experimental results that were obtained by implementing the payload of a cryptovirus on the Microsoft Windows platform. A novel countermeasure against cryptoviral extortion is presented that forces the API caller to demonstrate that an authorized party can recover the asymmetrically encrypted data. The attack is based entirely on the Microsoft Cryptographic API and the needed API calls are covered in detail. The exact sequence of API calls that is used for both the viral payload and the code for key generation, decryption, and so on is given. More specifically, it is shown that by using 8 types of API calls and 72 lines of ANSI C code, the payload can hybrid encrypt sensitive data and hold it hostage on the host computer system. These findings demonstrate the ease with which one can apply cryptography to devise the payload of a cryptovirus when a cryptographic API is readily available on host machines.
引用
收藏
页码:389 / 401
页数:13
相关论文
共 13 条
  • [1] BELLARE M, 1995, ADV CRYPTOLOGY EUROC, P992
  • [2] UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS
    CHAUM, DL
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (02) : 84 - 88
  • [3] *DOD, 1995, 522022M DOD
  • [4] *GEN SERV ADM, 1977, 1026 GEN SERV ADM
  • [5] GOLLE P, 2002, 9 ACM CCS, P59
  • [6] GULCU C, 1996, S NETW DISTR SYST SE, P2
  • [7] Jakobsson M, 1998, LECT NOTES COMPUT SC, V1403, P448, DOI 10.1007/BFb0054145
  • [8] *NIST, 2002, FIPS PUB, V1802
  • [9] *PKCS, 2002, 1 PKCS RSA LABS
  • [10] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017