[PDF][PDF] Novel Insights Into Cryptovirology: A Comprehensive Study

MK Yogi, SL Aparna - Journal of Network Security & Its …, 2011 - researchgate.net
MK Yogi, SL Aparna
Journal of Network Security & Its Applications (IJNSA), 2011researchgate.net
Accepted: 19/Jul/2018, Published: 31/Jul/2018 Abstract—Cryptography is presently used for
defensive purposes. Ciphers are used against passive attackers. Public key algorithms are
used against an active attacker in man-in-the-middle attack. Digital signature is used for
defending against a forger. E-cash systems are used against a counterfeiter and a double-
spender. Pseudorandom bit generators are used against a next-bit predictor. Crypto virology
is used for locating failures of protocols and vulnerabilities in design. For defending purpose …
Accepted: 19/Jul/2018, Published: 31/Jul/2018 Abstract—Cryptography is presently used for defensive purposes. Ciphers are used against passive attackers. Public key algorithms are used against an active attacker in man-in-the-middle attack. Digital signature is used for defending against a forger. E-cash systems are used against a counterfeiter and a double-spender. Pseudorandom bit generators are used against a next-bit predictor. Crypto virology is used for locating failures of protocols and vulnerabilities in design. For defending purpose Forward engineering is used.
researchgate.net
以上显示的是最相近的搜索结果。 查看全部搜索结果