Interdisciplinary Research Group in Socio-technical Cybersecurity
Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware
Abstract:
To achieve its goals, ransomware needs to employ strong encryption, which in turn requires access to high-grade encryption keys. Over the evolution of ransomware, various techniques have been observed to accomplish the latter. Understanding the advantages and disadvantages of each method is essential to develop robust defense strategies. In this paper we explain the techniques used by ransomware to derive encryption keys and analyze the security of each approach. We argue that recovery of data might be possible if the ransomware cannot access high entropy randomness sources. As an evidence to support our theoretical results, we provide a decryptor program for a previously undefeated ransomware.
Authors:
Genç Ziya Alper, Lenzini Gabriele, Ryan Peter
Publication date:
2018
Published in:
Advances in Cybersecurity 2018
Reference:
Genç, Z. A., Lenzini, G., & Ryan, P. Y. (2018, November). Security analysis of key acquiring strategies used by cryptographic ransomware. In Proceedings of the Central European Cybersecurity Conference 2018 (pp. 1-6).
Get in touch with us
SnT – Interdisciplinary Centre for Security, Reliability and Trust
Maison du Nombre, 6, avenue de la Fonte L-4364 Esch-sur-Alzette
info-irisc-lab@uni.lu