LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Analysis of Encryption Key Generation in Modern Crypto Ransomware

Photo by dawson2406 from unsplash

The scale of ransomware attacks increases every year, and so does its cost, which has reached billions of dollars. A specific class of ransomware, called crypto ransomware, encrypts data of… Click to show full abstract

The scale of ransomware attacks increases every year, and so does its cost, which has reached billions of dollars. A specific class of ransomware, called crypto ransomware, encrypts data of the victims for monetary gain. The encryption models adopted in crypto-ransomware can be very diverse, but, regardless, one of the critical aspects of the encryption process is the method used to generate the encryption key. The analysis of such a method can provide valuable information for understanding ransomware's innermost details and features, critical for building defenses. In this article, we analyze the encryption model and the encryption key generation process of ransomware samples from different families. We discuss the analysis methods and tools we used and the challenges in the analysis of ransomware code. Finally, we present the results of our study and discuss algorithms and functions used in modern crypto-ransomware.

Keywords: encryption; encryption key; analysis; crypto ransomware; ransomware

Journal Title: IEEE Transactions on Dependable and Secure Computing
Year Published: 2022

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.