In: Computer Science
Subject: Encryption in Malware/Viruses
o make an Introduction on this subject
o make a Methodology/ Algorithm on this subject
o setup a Coding / Setup on this subject
o and Application
o also add Reference
Encryption prevents viruses and other forms of malicious users from modifying, renaming, deleting, moving and reading the documents as well. Encryption is the most effective tool that truly provides the last line of defense against computer hackers. Unauthorized local users as well as online users will be unable to modify or access data. Prevention of unauthorized access is equally important to encryption of valuable data as well.
Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server, client, or computer network (by contrast, software that causes unintentional harm due to some deficiency is typically described as a software bug) A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, and scareware.
Programs are also considered malware if they secretly act against the interests of the computer user. For example, at one point Sony music Compact discs silently installed a rootkit on purchasers' computers with the intention of preventing illicit copying, but which also reported on users' listening habits, and unintentionally created extra security vulnerabilities
A range of antivirus software, firewalls and other strategies are used to help protect against the introduction of malware, to help detect it if it is already present, and to recover from malware-associated malicious activity and attacks. Therefore we required the need of encryption.
RSA algorithm is asymmetric cryptography algorithm. Asymmetric actually means that it works on two different keys i.e. Public Key and Private Key. As the name describes that the Public Key is given to everyone and Private key is kept private.
An example of asymmetric cryptography :
Since this is asymmetric, nobody else except browser can decrypt the data even if a third party has public key of browser.
The idea of RSA is based on the fact that it is difficult to factorize a large integer. The public key consists of two numbers where one number is multiplication of two large prime numbers. And private key is also derived from the same two prime numbers. So if somebody can factorize the large number, the private key is compromised. Therefore encryption strength totally lies on the key size and if we double or triple the key size, the strength of encryption increases exponentially. RSA keys can be typically 1024 or 2048 bits long, but experts believe that 1024 bit keys could be broken in the near future. But till now it seems to be an infeasible task.
Let us learn the mechanism behind RSA algorithm :
>> Generating Private Key :
Now we are ready with our – Public Key ( n = 3127 and e = 3) and Private Key(d = 2011)
Now we will encrypt “HI” :
Below is C implementation of RSA algorithm for small values:
|
Output :
Message data = 12.000000 Encrypted data = 3.000000 Original Message Sent = 12.000000
RSA laid the foundations for much of our secure communications. It was traditionally used in TLS and was also the original algorithm used in PGP encryption. RSA is still seen in a range of web browsers, email, VPNs, chat and other communication channels.
Note: Plzzz don' t give dislike.....Plzzz comment if u have any problem i will try to resolve it.......