Cryptology ePrint Archive: Report 2017/1007

Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys

Herman Galteland and Kristian Gjøsteen

Abstract: Protecting malware using encryption prevents an analyst, defending some computer(s) in the network, from analyzing the malicious code and identifying the intentions of the malware author. We discuss malware encryption schemes that use environmental encryption keys, generated from some computer(s) the malware author intends to attack, and is able to rerandomize ciphertexts, to make each malware sample in the network indistinguishable. We are interested in hiding the intentions and identity of the malware author, not in hiding the existence of malware.

Category / Keywords: Malicious cryptography, environmental keys, rerandomization, provable security

Original Publication (with major differences): Lecture Notes in Computer Science.
DOI:
10.1007/978-3-319-61273-7_12

Date: received 10 Oct 2017

Contact author: herman galteland at ntnu no

Available format(s): PDF | BibTeX Citation

Version: 20171013:172920 (All versions of this report)

Short URL: ia.cr/2017/1007

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]