Loading

Ransomware: An Illustration of Malicious Cryptography
Jagsir Singh1, Jaswinder Singh2 

1Jagsir Singh, Ph.D. Research Scholar in the Department of Computer Science and Engineering, Punjabi University Patiala.
2Dr. Jaswinder Singh, Associate Professor in the Department of Computer Science and Engineering, Punjabi University, Patiala.

Manuscript received on 03 March 2019 | Revised Manuscript received on 08 March 2019 | Manuscript published on 30 July 2019 | PP: 1608-1611 | Volume-8 Issue-2, July 2019 | Retrieval Number: B2327078219/19©BEIESP | DOI: 10.35940/ijrte.B2327.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Malware are the serious threat to the computer systems. Malware are written for many reasons: for stealing confidential data, for financial gain or to affect the working of the computer system. Ransomware is the most disastrous kind of malware which encrypts the user’s whole data and demands ransom (money) to decrypt the data. The user has to pay ransom for getting the decryption key. This becomes the nuisance of encryption algorithms which are used in ransomware attacks. In this paper, a study of ransomware malware is done with the perspective of encryption algorithms.
Index Terms: Bitcoins, Encryption, Malware, Ransomware.

Scope of the Article: Cryptography and Applied Mathematics