Malicious Cryptography

Cryptology is the study of the hidden word. It is an essential technology in times of war and has been in existence for thousands of years. The strategic positioning of troops is both a logistical challenge as well as a challenge from the perspective of information theory, since command and control information is subject to interception. It may be argued that cryptography has always had a dark side, since an enemy that uses it effectively will be able to conceal future enemy troop movements and other valuable information from allied forces. However, Malicious Cryptography digs much deeper into the dual-edged nature of cryptography. It shows how modern cryptographic paradigms and tools, including asymmetric cryptography, pseudorandom generators, reduction arguments, the random oracle model, etc. can in fact be used to degrade system security. The book details advanced computer viruses, worms, and Trojan horse programs that mount unprecedented attacks against their hosts. In short, it provides a glimpse of the future of information warfare, and also covers many of the tools that can be used to guard against these advanced threats to computing environments.

Link For Download
 
KiLL-9 CrEW Copyright © 2009 KiLL-9 CrEw Template Designed by Arianom Founder KilLL-9 CrEw Best Indonesian White Hacker. Allright Reserved.