⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 http:^^www.cs.columbia.edu^~ayoung^

📁 This data set contains WWW-pages collected from computer science departments of various universities
💻 EDU^~AYOUNG^
字号:
Date: Tue, 26 Nov 1996 02:50:03 GMT
Server: Apache/1.1.1
Content-type: text/html
Content-length: 1745
Last-modified: Tue, 17 Sep 1996 16:43:14 GMT

<TITLE>Adam Young</TITLE><body bgcolor = ffffff><H2>Adam Young</H2>    <PRE>BS     Electrical Eng.  Yale University     1994MS     Computer Science <!WA0><A HREF="http://www.columbia.edu">Columbia University</A> 1996Ph. D. Computer Science Columbia University ???? Publications:In the paper cited below, we describe attacks by viruses that use thepublic key of the virus author. We call such viruses cryptoviruses. Wedescribe anonymous and secure data stealing attacks, and extortion basedattacks where user data is public key encrypted. Since only the attacker knows the private key, only the attacker can recover the encrypted data.Hence, we are exploiting the asymmetry of public key cryptography.A. Young, M. Yung, "Cryptovirology: Extortion-Based Security Threats andCountermeasures", Proceedings of the 1996 IEEE Symposium on Security andPrivacy, pp. 129-140, May 6-8, IEEE Computer Society Press, 1996.      [ <!WA1><A HREF="http://www.cs.columbia.edu/~ayoung/ieee96.ps">Postscript</A> ]We then take cryptovirological attacks a step further and investigatewhat can be done by modifying cryptosystems to contain the attackerspublic key. In effect we apply "cryptography from within" tomount attacks that securely and subliminally leak secret key informationto the attacker. PGP can be modified to contain such a mechanism, whichwe call a Secretly Embedded Trapdoor with Universal Protection (SETUP).A. Young, M. Yung, "The Dark Side of Black-Box Cryptography -or-Should We Trust Capstone?", CRYPTO '96, Springer-Verlag.      [ <!WA2><A HREF="http://www.cs.columbia.edu/~ayoung/crypto96.ps">Postscript</A> ]Ph. D. advisor: Dean Zvi Galile-mail:  ayoung@cs.columbia.eduInterests: Guitar, Drums, Snowboarding, Computer Security,           Cryptography, and Information Warfare. </PRE><P>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -