CrypLovlrology LxLorLlonbased securlLy LhreaLs and
counLermeasures" by Suresh kumar and AvanL anwar vervlew of Lalk W lnLroduce CrypLovlrology W CrypLovlrus W Plgh survlvablllLy vlruses W MS CAl W 1ypes of aLLacks W LxLorLlon W lnformaLlon exLorLlon W SecreL sharlng vlrus ln a dlsLrlbuLed sysLem W Concluslon CrypLovlrology Crypto A SecurlLy paradlgm used for defenslve purposes V|ro|ogy SLudy of W CreaLlon W uupllcaLlon W ropagaLlon of vlruses CrypLovlrology whaL ls lL? W SLudy of appllcaLlons of crypLography Lo compuLer vlruses W Pow Lo use crypLo Lools as weapons ln vlrus aLLacks W We wlll see LhaL cerLaln crypLographlc Lools can be used Lo degrade securlLy Why learn crypLovlrology W lL Lakes a Lhlef Lo caLch a Lhlef W A crypLovlrologlsL aLLacks a compuLer sysLem or neLwork ln Lhe same sense LhaL a crypLanalysL aLLacks a crypLosysLem W Pelps Lo anLlclpaLe whaL aLLackers mlghL do once Lhey break lnLo our compuLers W SuggesLs LhaL cerLaln safeguards should be developed and puL lnLo place ueparLmenL of CSL Clobal Academy of 1echnology 3 Background on viruses Trojan horse Program within another program executing commands without the owner's knowledge Defense: confine programs into small domains with rights appropriate to their intended use virus Program that can infect other programs by modifying them to include a, possibly evolved, copy of itself Typically perform some disturbing / annoying actions Polymorphic virus virus that creates offspring with object code different from that of its parent Developed in response to how virus scanners work (identify viruses by searching for identifying strings) A few Lhlngs Lo noLe W vlrus only needs Lo have access Lo crypLographlc Lools W uoes noL necessarlly need Lo have Lools lmplemenLed ln lLs code W use S funcLlons such as provlded by MlcrosofL's CrypLographlc Al W 1hls means LhaL Lhe vlrus wrlLer need noL fully undersLand crypLography Lo creaLe vlrus 1ype of encrypLlon ueparLmenL of CSL Clobal Academy of 1echnology 8 SymmeLrlc key LncrypLlon ubllc key LncrypLlon roperLles of a vlrus 1) Consume Cu Llme and occupy space 2) need Lo modlfy code ln hosL sysLem - Such as Lo galn conLrol of Lhe program 3) Are vulnerable Lo user analysls - SysLem can be frozen and vlrus can be dlssecLed - oLenLlally allowlng for recovery by vlcLlm WlLh crypLovlruses we wlll bypass Lhe 3rd properLy CharaLerlsLlcs of a crypLovlrus W vlrus lLself ls encrypLed whlch makes deLecLlng Lhe vlrus very dlfflculL W lmmunlLy Lo deLecLlon by vlrus slgnaLures W LncrypLed communlcaLlon beLween Lhe vlrus and lLs auLhor W Plgh survlvablllLy of vlrus ueparLmenL of CSL Clobal Academy of 1echnology 10 Plgh survlvablllLy (PS) vlrus W ALLempL Lo make Lhe lnfecLed hosL dependenL on Lhe vlrus 1 Survlval of vlrus depends on survlval of hosL 2 lf user wanLs Lo rld hls machlne of Lhe vlrus he wlll lose access Lo Lhe lnfecLed resource 3 lf Lhls resource ls vlLal Lo operaLlon of sysLem Lhen user loses access Lo sysLem ApproxlmaLlon Lo PS vlrus very dlfflculL Lo consLrucL a pure PS vlrus W lL needs Lo galn access Lo daLa wlLhouL belng deLecLed W needs Lo be lmmune Lo all user analysls W LefL as an open problem ApproxlmaLlon W vlrus effecLs can only be removed by vlrus auLhor (so lL ls survlvable) W vlrus has publlc key auLhor has prlvaLe key MlcrosofL CrypLographlc Al W WlnAl CrypLAcqulreConLexL W WlnAl CrypLCen8andom W WlnAl CrypLCenkey W WlnAl CrypLSeLkeyaram W WlnAl CrypLlmporLkey W WlnAl CrypLuesLroyPash eLc osslble peraLlng SysLem CounLermeasures A mechanlsm LhaL can be lncorporaLed lnLo Lhe operaLlng sysLem W 8efore asymmeLrlcally encrypLlng elLher 1 1he user musL prove Lo Lhe kernel ln zeroknowledge Lhe possesslon of Lhe needed prlvaLe decrypLlon key lor efflclency reasons Lhls can be requlred when Lhe user logs ln or 2 1he publlc encrypLlon key musL be Laken from a LrusLed cerLlflcaLele a cerLlflcaLe LhaL Lhe kernel verlfles all Lhe way Lo Lhe rooL (uslng Lhe onllne cerLlflcaLe sLaLus proLocol (CS) 1hls way Lhe kernel wlll only encrypL daLa when lL ls cerLaln LhaL an auLhorlzed user wlll be able Lo decrypL lL 1yplcal crypLovlral aLLack W CrypLovlrus aLLaches lLself Lo some daLa W LncrypLs LhaL daLa uslng SymmeLrlc key W LncrypLs Lhe symmeLrlc key uslng publlc key of auLhor W LncrypLs LhaL daLa uslng lLs publlc key W uLs Lhe daLa up for ransom W 1he vlcLlm may elLher choose Lo pay Lhe ransom money or lose Lhe daLa ueparLmenL of CSL Clobal Academy of 1echnology 13 CrypLographlcal aLLack |n|t|on A denlal of servlce aLLack uslng publlc key crypLosysLems Attack performed by a crypLo vlrus/Lro[an Cryptov|rus W CompuLer vlrus LhaL uses a publlc key generaLed by Lhe vlrus auLhor Lo encrypL daLa LhaL resldes on Lhe hosL sysLem W 1he daLa can only be resLored by Lhe vlrus auLhor (assumlng no backup exlsLs) W ls survlvable SeLLlng for a uoS crypLoaLLack 1) LncrypL daLa on hosL uslng some publlc key crypLosysLem 2) noLlfy user of aLLack and demand LhaL he conLacL Lhe vlrus auLhor 3) AuLhor demands a ransom ln reLurn of Lhe prlvaLe (decrypLlon) key W user elLher W ays ransom reLrleves daLa W uenles ransom loses daLa W Pas a backup lgnores ransom W Corresponds Lo LxLorLlon roblems and SoluLlon 9rob|s W CannoL free one vlcLlm (reveal prlvaLe key) wlLhouL posslbly freelng all vlcLlms vlcLlm could publlsh decrypLlon key W uecrypLlon of daLa uslng publlc key crypLo ls slow SoluLlon W Pybrld crypLosysLem comblne publlc and secreL key crypLo schemes W LncrypL daLa uslng symmeLrlc crypLo scheme (wlLh a sesslon key) W LncrypL sesslon key uslng publlc crypLo scheme W rlvaLe key ls never revealed W Why noL slmply use a symmeLrlc crypLoscheme? Specs for aLLack CrypLovlrus wlll need access Lo 8andom number generaLor random sesslon key 8andom seed generaLor lnlLlallzaLlon vecLor (lv) -otat|ons W ks random sesslon key kz publlc key W lv random lv kw secreL key W M lv ks plalnLexL z vlrus W M' mkz clpherLexL w vlrus auLhor 8aslc LxLorLlon ALLack 1) LncrypL daLa u uslng sesslon key (symmeLrlc) - u' uks - ueleLe u 2) CreaLe M' lv kskz 3) noLlfy hosL/vlcLlm dlsplay M' and conLacL lnfo 4) vlcLlm glves M' and ransom Lo vlrus auLhor 3) AuLhor decrypLs u(M' ) M lv ks and sends M Lo vlcLlm lnformaLlon exLorLlon aLLack W ldea ALLacker wlll force vlcLlm Lo reveal some deslred lnformaLlon P ALLacker wlll be able Lo verlfy Lhe auLhenLlclLy of P W ALLack ls only successful lf Lhe crypLovlrus can aLLack crlLlcal lnformaLlon for whlch no backup exlsLs W ALLack can W LxLorL lnformaLlon W 8e used as Lool for esplonage and lnformaLlon warfare lnformaLlon exLorLlon aLLack conLlnued LxLenslon creaLe checksum of Lhe flle Lo be requesLed (Lhrough exLorLlon) W vlrus looks for crlLlcal daLa u and deslred daLa P W vlrus encrypLs u' uks W Checksum ChkSum checksum(u lv ks) W lalnLexL m ChkSum lv ks W ClpherLexL m' mkz W noLlfy user ulsplay m' and requesL for P W vlrus auLhor geLs P compares ChkSum frees vlcLlm lnformaLlon aLLack $ W lf elecLronlc money ls lmplemenLed W vlrus searches for emoney noLes and encrypLs Lhem W uemand half Lhe money W lf vlcLlm had prevlously encrypLed emoney W uoes noL help vlrus encrypLed enoLes are useless W Assumes LhaL no emoney revocaLlon sysLem" exlsLs W 1hls lnformaLlon aLLack LranslaLes dlrecLly lnLo Lhe loss of $ Lo Lhe vlcLlm SecreL Sharlng vlrus W SeLLlng ulsLrlbuLed SysLem W vlrus wlll manage prlvaLe key (lnsLead of auLhor) Sub[ecL Lo user analysls W Approach W Conslder Lhe hosL Lo conslsL of Lhe enLlre neLwork W use dlsLrlbuLed envlronmenL Lo hlde Lhe key ln vlrus coples (each node) W CannoL sLore enLlre key ln slngle node user of LhaL node could poLenLlally reLrleve Lhe key W Assume access conLrol beLween neLwork nodes nodes don'L have access Lo each oLhers daLa SecreL sharlng scheme conLlnued Ll Camal based secreL sharlng W Large prlme p W CeneraLor g W rlvaLe exponenL x W ubllc resldue y gx mod p Lach lnsLance of vlrus W knows p g W CreaLes xl yl gxl mod p W Wlll collaboraLe Lo creaLe encrypLlon and decrypLlon keys ? encrypLlon x decrypLlon LncrypLlon / uecrypLlon ln crt ar|ng c W ncrypt|on W Lach vlrus publlshes lLs yl anonymously over a publlc channel W (bulleLln board) W Lach vlrus Lhen reads publlc channel and compuLes LncrypLlon key ? y1 * y2 * * ym (mod p) W crypt|on W Lach vlrus reveals Lhelr secreL xl W uecrypLlon key x x1 + x2 + + xm (mod p 1) W noLe shared decrypLlon ls now revealed W Lach vlrus can encrypL daLa on hosL need Lo noLlfy hosL Lo avold deleLlon of slngle vlrus SLeallng ALLack W Securely sLeal lnformaLlon from a remoLe locaLlon W uepend on spread of vlrus as Lhe communlcaLlon medlum W Pow lL works W vlrus encrypLs daLa u u' W vlrus appends u' Lo lLself W uo noL noLlfy Lhe user W kllls any ancesLor LhaL does noL have u' W Lucky vlrus auLhor wlll encounLer vlrus offsprlng wlLh u' and decrypL lL W Why noL [usL posL lnformaLlon onllne as ln Lhe secreL sharlng vlrus? revenLlons agalnsL crypLoaLLacks? W AnLlvlrus sofLware W CrypLovlruses propagaLe ln Lhe same way as LradlLlonal vlruses W Same deLecLlon meLhods apply W Access conLrol Lo crypLographlc Lools W lf sLrong crypLo clphers and random number generaLors are avallable Lo user processes Lhen Lhey are avallable Lo vlruses lnformaLlon warfare W lnformaLlon warfare ls Lhe use and managemenL of lnformaLlon ln pursulL of a compeLlLlve advanLage over an opponenL ueparLmenL of CSL Clobal Academy of 1echnology 29 8ole of crypLovlrology ln lnformaLlon warfare W 8aLLles of Lhe fuLure wlll be declded by Lhe counLrles whlch have Lhe leadlng edge ln crypLovlrologlcal Lechnologles and counLermeasures W May be used Lo creaLe panlc by uslng meLhods such as rlslng a false nuclear alarm W May be used Lo encrypL and block mlllLary daLabases of enemy naLlons W Can be used Lo brlng down communlcaLlon neLworks of enemles by causlng uenlal of Servlce (uoS) aLLacks on a large scale ueparLmenL of CSL Clobal Academy of 1echnology 30 osslble CounLer Measures W updaLe all sofLwares llke operaLlng sysLem drlvers all sofLwares LhaL use Lhe lnLerneL and updaLe anLl vlrus and anLl spyware W lnsLall lnbound and ouLbound flrewall W LncrypL lmporLanL daLa W 8ackup Lhe daLa regularly W lnsLall Lhlrd parLy reglsLry edlLor Lrafflc monlLorlng sofLware W ulsable auLorun feaLure ln x W Pope anLlvlrus vendors flnd a cure for lL ln near fuLure Concluslon W CrypLography wlLh vlrology ls a deadly comblnaLlon W 1he baLLle beLween vlrus wrlLers and anLl vlrus vendors ls raglng hard W 1he use of crypLography ln vlrology ls one such Lool used by vlrus wrlLers Lo wln Lhe baLLle W AnLlvlrus vendors do noL have any answer for such LhreaLs as of now and Lhey may come up wlLh remedles W 1he cycle conLlnues ueparLmenL of CSL Clobal Academy of 1echnology 32 8eferences W lLLL paper on CrypL ovlrology LxLorLlon8ased SecurlLy 1hreaLs and CounLermeasures" by Adam ?oung and MoLl ?ungyear of publlcaLlon 1996 W lLLL paper on n lundamenLal LlmlLaLlons of rovlng uaLa 1hefL" by Adam ?oung and MoLl ?ungyear of publlcaLlon 2006 W hLLp//wwwcrypLovlrologycom