CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES

Authors

DOI:

https://doi.org/10.28925/2663-4023.2020.10.628

Keywords:

cryptovirology, guarantee information systems, cyberattack, encryption, cryptography, cryptanalysis, cryptoalgorithm, programmable logic integrated circuits, software tools for attacks..

Abstract

This paper examines the security threats to guaranteed information systems, as well as measures to combat encryption viruses. A typical sequence of cyberattacks with information encryption using software tools to implement attacks is determined. The sequence of procedures of the WannaCry encryption part is described. The paper proposes a description of the computational complexity of encrypted data recovery problems, including methods for parallelizing the solution of cryptanalysis problems, methods used to solve problems of cryptosystem stability assessment, vulnerability search and decryption depending on basic mathematical methods. The application of distributed computing technology to solve problems of recovery of encrypted resources is described. The paper states that in modern conditions of constant development of cryptography methods with a high level of stability and their wide availability a necessary condition for improving the recovery of encrypted programs - data seekers is to create a special software security monitor and build specialized multiprocessor systems to implement cryptanalysis methods with wide access of authorized users. , from the point of view of minimizing the ratio "cost - the result" the most rational approach to creating specialized multiprocessor systems is to build a cluster system based on the most powerful general-purpose computers using hardware computing accelerators based on programmable logic integrated circuits to increase the effectiveness of attacks on cryptographic software tools for the implementation of attacks, it is advisable to develop technologies for active actions in cyberspace, in particular, those that provide the formation of hidden channels.

Downloads

Download data is not yet available.

References

A. Young, M. Yung Cryptovirology: extortion-based security threats and countermeasures, Published in: Proceedings 1996 IEEE Symposium on Security and Privacy, 6-8 May 1996, Oakland, CA, USA, Publisher: IEEE DOI: 10.1109 /SECPRI.1996.502676 ISBN: 0-8186-7417-2, Pp. 125-140.

A. Young, M. Yung. Malicious cryptography exposing cryptovirology. Wiley Publishing, Inc., p. 392, 2004.

Clark., Z., 2017. The Worm That Spreads Wanacrypt0r. [online] Malwarebytes. Available at: <https://blog.malwarebytes.com/threat-analysis/2017/05/the-worm-that-spreads-wanacrypt0r/> [Accessed 5 October 2020].

Suiche M., 2017. WannaCry Decrypting files with WanaKiwi + Demos. [online] Comae Technologies. Available at: https://blog.comae.io/wannacry-decrypting-files-with-wanakiwi-demo-86bafb81112d. [Accessed 5 October 2020].

S.A. Shivale, "Cryptovirology: Virus Approach", International Journal of Network Security & Its Applications (IJNSA), № 3 (4), p.33-46, 2011.

Kaur, J., Jaafar F. and Zavarsky P., 2018. An Empirical Analysis of Crypto-Ransomware Behavior. In: The Thirteenth International Conference on Systems (ICONS 2018). pp.1-7.

Gorbenko ID, Gorbenko YI Applied cryptology: Theory. Practice. Application. Monograph. - Kharkiv, FORT, 2012, 880 p.

Babash AV, Shankin GP, Cryptography, M .: SOLON-R, 2002, -512p.

Bauer F. Decrypted Secrets: methods and maxims of cryptology. NY: Springer, p. 472, 1997.

Schneier B. Applied cryptography. Protocols, algorithms, source texts in C language. - М .: Триумф, 2002. - 816 с.

Alan G. Konheim, Computer Security and Cryptography, Published by John Wiley & Sons, Inc., Hoboken, New Jersey, p. 521, 2007.

Grushko, A., 1999. On the existence of hidden channels. Discrete Mathematics, 1 (11), pp.24-28.

Rowland C. H. Covert channels in the TCP / IP protocol suite. 1997, First Monday, 2 (5). https://doi.org/10.5210/fm.v2i5.528

J. Kelsey Side Channel Cryptanalysis of Product Ciphers / J. Kelsey, B. Schneier, D. Wagner, C. Hall // 5th European Symposium on Research in Computer Security Louvain-la-Neuve, Belgium September 16–18, 1998 Proceedings, Berlin, Springer, 1998, pp.97-111.

Shcherbakov A.Yu., Domashev AV, Applied cryptography. Use and synthesis of cryptographic interfaces. - M .: Publishing and trading house "Russian edition", 2003, 416 p .: ill.

Gulak GM, Ensuring the security of CCI in cyberspace. Proceedings of the scientific and technical conference "Modern information and telecommunication technologies", volume IU Modern technologies of information security, -K .: - 2015, p.100-102.

Gold B., Raider C. Digital signal processing. - M.,: «Sov. Radio », 1973, p. 368.

Gorbenko I., Gulak G., Oleynikov R., Shumov A., Gorbenko Yu. 2003, Basic design principles, assessment of durability and prospects of using the AES encryption algorithm in Ukraine // Scientific and technical collection "Legal, regulatory and metrological support" ", (7), p.14

Gorbenko ID, Gulak GM, Oliynikov RV, Ruzhentsev VI, Mikhailenko MS, 2005, Analysis of the properties of block symmetric encryption algorithms (according to the results of the international project NESSIE) // 8 International scientific-practical conference "Information security in information and telecommunication systems". Abstracts of reports. –K. 2005. p. 17-18.

Rudskoy, V., On the zero practical significance of “Key determination attack of a full-round block cipher GOST 28147-89 with zero labor intensity and memory. In: Report at the RusCrypto-2010 conference.

Gulak G., Gorbenko I., Mikhailenko M., Gitis Yu., 2003. Block symmetric cryptoalgorithm SHACAL-2. Scientific and technical collection "Legal, regulatory and metrological support", (7), p. 86-100.

Gulak GM, 2008. Risk assessment during engineering safety analysis of steganographic systems. Collection of scientific works of NAU. Special issue, K .: NAU, p. 259-264.

Gulak, G. and Kovalchuk, L., 2001. Different approaches to determining random sequences. Scientific and technical collection "Legal, regulatory and metrological support of the information protection system in Ukraine", (3), p.127-133.

A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1 (1): 11-33, Jan-March 2004 ..

V. Maslovsky, Method of guaranteed protection of information from leakage through PEMIN channels. St. Petersburg: Abstract of the thesis for the degree of candidate of technical sciences and HAC RF 05.13.19, 2003, p. twenty.

ISO / IEC / IEEE 24765: 2017 Systems and software engineering - Vocabulary. [Online]. Available: https://www.iso.org/standard/71952.html. [Accessed: 06-Nov-2020].

P. Pavlenko, S. Filonenko and K. Babich, Information Systems and Technologies: A Master Book. K .: NAU, 2013, p. 324.

V. Kharchenko, "Dependability and Dependable Systems: Elements of Methodology", Radioelectronic and Computer Systems, No. 5, p. 7-19, 2006. [Accessed 24 December 2020].

Fedukhin AV, Cespedes Garcia NV, "Attributes and metrics of reliable computer systems", Mathematical machines and systems, no. 195-201, 2013.

V. Glukhov, "Assessment of the guaranteed publishing of cryptographic computer systems", Bulletin of the National University "Lvivska Politekhnika", no. 616, p. 66-72, 2008.

Law of Ukraine On electronic servants / Vidomosty Verkhovnoy Radi (VVR), 2017, No. 45, art. 400.

I. Gorbenko and Yu. Gorbenko, Applied Cryptology: Theory. Practice. Stuck: Monograph., 2nd ed. Kharkiv: "Fort", 2012, p. 880.

V. Yashchenko, N. Varnovsky and Y. Nesterenko, Introduction to cryptography. M .: MTsNMO, 2012, p. 348.

A. Babash and G. Shankin, Cryptography. M .: SOLON-R, 2002, p. 512

Downloads


Abstract views: 487

Published

2020-12-24

How to Cite

Hulak, H. . ., Buriachok, V. ., Skladannyi, P. . ., & Kuzmenko, L. . . (2020). CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(10), 6–28. https://doi.org/10.28925/2663-4023.2020.10.628

Most read articles by the same author(s)

1 2 3 4 > >>