Sie sind auf Seite 1von 33

CrypLovlrology

CrypLovlrology LxLorLlonbased securlLy LhreaLs and


counLermeasures" by Suresh kumar and AvanL
anwar
vervlew of Lalk
W lnLroduce CrypLovlrology
W CrypLovlrus
W Plgh survlvablllLy vlruses
W MS CAl
W 1ypes of aLLacks
W LxLorLlon
W lnformaLlon exLorLlon
W SecreL sharlng vlrus ln a dlsLrlbuLed sysLem
W Concluslon
CrypLovlrology
Crypto
A SecurlLy paradlgm used for defenslve purposes
V|ro|ogy
SLudy of
W CreaLlon
W uupllcaLlon
W ropagaLlon of vlruses
CrypLovlrology whaL ls lL?
W SLudy of appllcaLlons of crypLography Lo
compuLer vlruses
W Pow Lo use crypLo Lools as weapons ln vlrus
aLLacks
W We wlll see LhaL cerLaln crypLographlc Lools can be
used Lo degrade securlLy
Why learn crypLovlrology
W lL Lakes a Lhlef Lo caLch a Lhlef
W A crypLovlrologlsL aLLacks a compuLer sysLem or
neLwork ln Lhe same sense LhaL a crypLanalysL
aLLacks a crypLosysLem
W Pelps Lo anLlclpaLe whaL aLLackers mlghL do once
Lhey break lnLo our compuLers
W SuggesLs LhaL cerLaln safeguards should be
developed and puL lnLo place
ueparLmenL of CSL Clobal Academy of
1echnology
3
Background on viruses
Trojan horse
Program within another program executing commands
without the owner's knowledge
Defense: confine programs into small domains with
rights appropriate to their intended use
virus
Program that can infect other programs by modifying
them to include a, possibly evolved, copy of itself
Typically perform some disturbing / annoying actions
Polymorphic virus
virus that creates offspring with object code different
from that of its parent
Developed in response to how virus scanners work
(identify viruses by searching for identifying strings)
A few Lhlngs Lo noLe
W vlrus only needs Lo have access Lo
crypLographlc Lools
W uoes noL necessarlly need Lo have Lools
lmplemenLed ln lLs code
W use S funcLlons such as provlded by
MlcrosofL's CrypLographlc Al
W 1hls means LhaL Lhe vlrus wrlLer need noL fully
undersLand crypLography Lo creaLe vlrus
1ype of encrypLlon
ueparLmenL of CSL Clobal Academy of
1echnology
8
SymmeLrlc key LncrypLlon ubllc key LncrypLlon
roperLles of a vlrus
1) Consume Cu Llme and occupy space
2) need Lo modlfy code ln hosL sysLem
- Such as Lo galn conLrol of Lhe program
3) Are vulnerable Lo user analysls
- SysLem can be frozen and vlrus can be dlssecLed
- oLenLlally allowlng for recovery by vlcLlm
WlLh crypLovlruses we wlll bypass Lhe 3rd
properLy
CharaLerlsLlcs of a crypLovlrus
W vlrus lLself ls encrypLed whlch makes deLecLlng Lhe
vlrus very dlfflculL
W lmmunlLy Lo deLecLlon by vlrus slgnaLures
W LncrypLed communlcaLlon beLween Lhe vlrus and lLs
auLhor
W Plgh survlvablllLy of vlrus
ueparLmenL of CSL Clobal Academy of
1echnology
10
Plgh survlvablllLy (PS) vlrus
W ALLempL Lo make Lhe lnfecLed hosL dependenL on Lhe
vlrus
1 Survlval of vlrus depends on survlval of hosL
2 lf user wanLs Lo rld hls machlne of Lhe vlrus
he wlll lose access Lo Lhe lnfecLed resource
3 lf Lhls resource ls vlLal Lo operaLlon of sysLem
Lhen user loses access Lo sysLem
ApproxlmaLlon Lo PS vlrus
very dlfflculL Lo consLrucL a pure PS vlrus
W lL needs Lo galn access Lo daLa wlLhouL belng
deLecLed
W needs Lo be lmmune Lo all user analysls
W LefL as an open problem
ApproxlmaLlon
W vlrus effecLs can only be removed by vlrus
auLhor (so lL ls survlvable)
W vlrus has publlc key auLhor has prlvaLe key
MlcrosofL CrypLographlc Al
W WlnAl CrypLAcqulreConLexL
W WlnAl CrypLCen8andom
W WlnAl CrypLCenkey
W WlnAl CrypLSeLkeyaram
W WlnAl CrypLlmporLkey
W WlnAl CrypLuesLroyPash eLc
osslble peraLlng SysLem
CounLermeasures
A mechanlsm LhaL can be lncorporaLed lnLo Lhe operaLlng
sysLem
W 8efore asymmeLrlcally encrypLlng elLher
1 1he user musL prove Lo Lhe kernel ln zeroknowledge
Lhe possesslon of Lhe needed prlvaLe decrypLlon key
lor efflclency reasons Lhls can be requlred when Lhe
user logs ln or
2 1he publlc encrypLlon key musL be Laken from a LrusLed
cerLlflcaLele a cerLlflcaLe LhaL Lhe kernel verlfles all
Lhe way Lo Lhe rooL (uslng Lhe onllne cerLlflcaLe sLaLus
proLocol (CS)
1hls way Lhe kernel wlll only encrypL daLa when lL ls
cerLaln LhaL an auLhorlzed user wlll be able Lo decrypL
lL
1yplcal crypLovlral aLLack
W CrypLovlrus aLLaches lLself Lo some daLa
W LncrypLs LhaL daLa uslng SymmeLrlc key
W LncrypLs Lhe symmeLrlc key uslng publlc key of
auLhor
W LncrypLs LhaL daLa uslng lLs publlc key
W uLs Lhe daLa up for ransom
W 1he vlcLlm may elLher choose Lo pay Lhe ransom
money or lose Lhe daLa
ueparLmenL of CSL Clobal Academy of
1echnology
13
CrypLographlcal aLLack
|n|t|on A denlal of servlce aLLack uslng publlc
key crypLosysLems
Attack performed by a crypLo vlrus/Lro[an
Cryptov|rus
W CompuLer vlrus LhaL uses a publlc key generaLed by
Lhe vlrus auLhor Lo encrypL daLa LhaL resldes on Lhe
hosL sysLem
W 1he daLa can only be resLored by Lhe vlrus auLhor
(assumlng no backup exlsLs)
W ls survlvable
SeLLlng for a uoS crypLoaLLack
1) LncrypL daLa on hosL uslng some publlc key
crypLosysLem
2) noLlfy user of aLLack and demand LhaL he conLacL
Lhe vlrus auLhor
3) AuLhor demands a ransom ln reLurn of Lhe prlvaLe
(decrypLlon) key
W user elLher
W ays ransom reLrleves daLa
W uenles ransom loses daLa
W Pas a backup lgnores ransom
W Corresponds Lo LxLorLlon
roblems and SoluLlon
9rob|s
W CannoL free one vlcLlm (reveal prlvaLe key)
wlLhouL posslbly freelng all vlcLlms
vlcLlm could publlsh decrypLlon key
W uecrypLlon of daLa uslng publlc key crypLo ls slow
SoluLlon
W Pybrld crypLosysLem comblne publlc and secreL
key crypLo schemes
W LncrypL daLa uslng symmeLrlc crypLo scheme (wlLh
a sesslon key)
W LncrypL sesslon key uslng publlc crypLo scheme
W rlvaLe key ls never revealed
W Why noL slmply use a symmeLrlc crypLoscheme?
Specs for aLLack
CrypLovlrus wlll need access Lo
8andom number generaLor random sesslon key
8andom seed generaLor lnlLlallzaLlon vecLor (lv)
-otat|ons
W ks random sesslon key kz publlc key
W lv random lv kw secreL key
W M lv ks plalnLexL z vlrus
W M' mkz clpherLexL w vlrus auLhor
8aslc LxLorLlon ALLack
1) LncrypL daLa u uslng sesslon key (symmeLrlc)
- u' uks
- ueleLe u
2) CreaLe M' lv kskz
3) noLlfy hosL/vlcLlm dlsplay M' and conLacL lnfo
4) vlcLlm glves M' and ransom Lo vlrus auLhor
3) AuLhor decrypLs u(M' ) M lv ks and sends M Lo
vlcLlm
lnformaLlon exLorLlon aLLack
W ldea ALLacker wlll force vlcLlm Lo reveal some
deslred lnformaLlon P
ALLacker wlll be able Lo verlfy Lhe auLhenLlclLy of
P
W ALLack ls only successful lf Lhe crypLovlrus can aLLack
crlLlcal lnformaLlon for whlch no backup exlsLs
W ALLack can
W LxLorL lnformaLlon
W 8e used as Lool for esplonage and lnformaLlon
warfare
lnformaLlon exLorLlon aLLack
conLlnued
LxLenslon creaLe checksum of Lhe flle Lo be requesLed
(Lhrough exLorLlon)
W vlrus looks for crlLlcal daLa u and deslred daLa P
W vlrus encrypLs u' uks
W Checksum ChkSum checksum(u lv ks)
W lalnLexL m ChkSum lv ks
W ClpherLexL m' mkz
W noLlfy user ulsplay m' and requesL for P
W vlrus auLhor geLs P compares ChkSum frees vlcLlm
lnformaLlon aLLack $
W lf elecLronlc money ls lmplemenLed
W vlrus searches for emoney noLes and encrypLs
Lhem
W uemand half Lhe money
W lf vlcLlm had prevlously encrypLed emoney
W uoes noL help vlrus encrypLed enoLes are
useless
W Assumes LhaL no emoney revocaLlon sysLem"
exlsLs
W 1hls lnformaLlon aLLack LranslaLes dlrecLly lnLo Lhe
loss of $ Lo Lhe vlcLlm
SecreL Sharlng vlrus
W SeLLlng ulsLrlbuLed SysLem
W vlrus wlll manage prlvaLe key (lnsLead of auLhor)
Sub[ecL Lo user analysls
W Approach
W Conslder Lhe hosL Lo conslsL of Lhe enLlre neLwork
W use dlsLrlbuLed envlronmenL Lo hlde Lhe key ln vlrus
coples (each node)
W CannoL sLore enLlre key ln slngle node
user of LhaL node could poLenLlally reLrleve Lhe key
W Assume access conLrol beLween neLwork nodes
nodes don'L have access Lo each oLhers daLa
SecreL sharlng scheme conLlnued
Ll Camal based secreL sharlng
W Large prlme p
W CeneraLor g
W rlvaLe exponenL x
W ubllc resldue y gx mod p
Lach lnsLance of vlrus
W knows p g
W CreaLes xl yl gxl mod p
W Wlll collaboraLe Lo creaLe encrypLlon and
decrypLlon keys
? encrypLlon x decrypLlon
LncrypLlon / uecrypLlon ln
crt ar|ng c
W ncrypt|on
W Lach vlrus publlshes lLs yl anonymously over a publlc
channel
W (bulleLln board)
W Lach vlrus Lhen reads publlc channel and compuLes
LncrypLlon key ? y1 * y2 * * ym (mod p)
W crypt|on
W Lach vlrus reveals Lhelr secreL xl
W uecrypLlon key x x1 + x2 + + xm (mod p 1)
W noLe shared decrypLlon ls now revealed
W Lach vlrus can encrypL daLa on hosL
need Lo noLlfy hosL Lo avold deleLlon of slngle vlrus
SLeallng ALLack
W Securely sLeal lnformaLlon from a remoLe locaLlon
W uepend on spread of vlrus as Lhe communlcaLlon
medlum
W Pow lL works
W vlrus encrypLs daLa u u'
W vlrus appends u' Lo lLself
W uo noL noLlfy Lhe user
W kllls any ancesLor LhaL does noL have u'
W Lucky vlrus auLhor wlll encounLer vlrus offsprlng
wlLh u' and
decrypL lL
W Why noL [usL posL lnformaLlon onllne as ln Lhe secreL
sharlng vlrus?
revenLlons agalnsL crypLoaLLacks?
W AnLlvlrus sofLware
W CrypLovlruses propagaLe ln Lhe same way as
LradlLlonal vlruses
W Same deLecLlon meLhods apply
W Access conLrol Lo crypLographlc Lools
W lf sLrong crypLo clphers and random number
generaLors are avallable Lo user processes Lhen
Lhey are avallable Lo vlruses
lnformaLlon warfare
W lnformaLlon warfare ls Lhe use and managemenL of
lnformaLlon ln pursulL of a compeLlLlve advanLage
over an opponenL
ueparLmenL of CSL Clobal Academy of
1echnology
29
8ole of crypLovlrology ln lnformaLlon
warfare
W 8aLLles of Lhe fuLure wlll be declded by Lhe counLrles
whlch have Lhe leadlng edge ln crypLovlrologlcal
Lechnologles and counLermeasures
W May be used Lo creaLe panlc by uslng meLhods such
as rlslng a false nuclear alarm
W May be used Lo encrypL and block mlllLary daLabases
of enemy naLlons
W Can be used Lo brlng down communlcaLlon neLworks
of enemles by causlng uenlal of Servlce (uoS) aLLacks
on a large scale
ueparLmenL of CSL Clobal Academy of
1echnology
30
osslble CounLer Measures
W updaLe all sofLwares llke operaLlng sysLem drlvers all
sofLwares LhaL use Lhe lnLerneL and updaLe anLl vlrus
and anLl spyware
W lnsLall lnbound and ouLbound flrewall
W LncrypL lmporLanL daLa
W 8ackup Lhe daLa regularly
W lnsLall Lhlrd parLy reglsLry edlLor Lrafflc monlLorlng
sofLware
W ulsable auLorun feaLure ln x
W Pope anLlvlrus vendors flnd a cure for lL ln near
fuLure
Concluslon
W CrypLography wlLh vlrology ls a deadly comblnaLlon
W 1he baLLle beLween vlrus wrlLers and anLl vlrus
vendors ls raglng hard
W 1he use of crypLography ln vlrology ls one such Lool
used by vlrus wrlLers Lo wln Lhe baLLle
W AnLlvlrus vendors do noL have any answer for such
LhreaLs as of now and Lhey may come up wlLh
remedles
W 1he cycle conLlnues
ueparLmenL of CSL Clobal Academy of
1echnology
32
8eferences
W lLLL paper on CrypL ovlrology
LxLorLlon8ased SecurlLy 1hreaLs and CounLermeasures" by Adam ?oung and MoLl ?ungyear
of publlcaLlon 1996
W lLLL paper on n lundamenLal LlmlLaLlons of rovlng uaLa 1hefL" by Adam ?oung and MoLl
?ungyear of publlcaLlon 2006
W hLLp//wwwcrypLovlrologycom

Das könnte Ihnen auch gefallen