A Book About Cryptovirology

"Tomorrow's hackers may ransack the cryptographer's toolkit for their own nefarious needs. From this chilling perspective, the authors make a solid scientific contribution, and tell a good story too." -- Matt Franklin, UC Davis

Sold at:

Amazon

Amazon UK

Barnes & Noble


Table of Contents
Foreword by Gus Simmons
Acknowledgments
Introduction
Chapter 1. Through Hacker's Eyes
Chapter 2. Cryptovirology
Chapter 3. Tools for Security and Insecurity
Chapter 4. The Two Faces of Anonymity
Chapter 5. Cryptocounters
Chapter 6. Computationally Secure Information Stealing
Chapter 7. Non-Zero Sum Games and Survivable Malware
Chapter 8. Coping with Malicious Software
Chapter 9. The Nature of Trojan Horses
Chapter 10. Subliminal Channels
Chapter 11. SETUP Attack on Factoring Based Key Generation
Chapter 12. SETUP Attacks on Discrete-Log Cryptosystems
Appendix A: Computer Virus Basics
Appendix B: Notation and Other Background Information
Appendix C: Public Key Cryptography in a Nutshell
Glossary
References
Index